Feeds

Feds hunt 30-year-old alleged to be lord of Gameover botnet

Arrest warrant out as recommended clean-up site staggers under demand

Providing a secure and efficient Helpdesk

The FBI has released a wanted notice for 30-year-old Russian national Evgeniy Mikhailovich Bogachev, whom they allege to be the mastermind behind both the Gameover ZeuS and the even more infamous CryptoLocker ransomware.

A US indictment has been unsealed against the suspect following an FBI-led takedown operation that disrupted the internet infrastructure upon which the Gameover ZeuS botnet and the CryptoLocker ransomware had been running.

Bogachev, 30, of Anapa, Russian Federation, was charged with conspiracy, computer hacking, wire fraud, bank fraud and money laundering in connection with his alleged role as an administrator of the Gameover ZeuS botnet. Bogachev is further charged with conspiracy to commit bank fraud related to his alleged involvement in a cybercrime scam involving Jabber ZeuS, a prior variant of ZeuS malware.

A separate US civil suit alleges Bogachev leads a tightly knit gang of cyber criminals based in Russia and Ukraine behind both the Gameover ZeuS and the even more infamous CryptoLocker ransomware.

Gameover ZeuS is a common distribution mechanism for CryptoLocker, which is also spread using infected email attachments that pose as a voicemail or shipping confirmation. A DoJ statement on the case alleged Bogachev is using the online nicknames "Slavik" and "Pollingsoon", among others, to rule the criminal network.

The FBI, Europol and UK’s National Crime Agency coordinated an attack to dismantle the infrastructure of the GameOver ZeuS botnet as part of Operation Tovar. The Feds said they'd identified and seized "servers acting as command and control hubs for the Cryptolocker malware".

Technical assistance in running the operation was provided by a variety of tech firms including Dell SecureWorks, CrowdStrike, Microsoft, F-Secure, Level 3 Communications, McAfee, Symantec, Trend Micro and others.

GameOver ZeuS, which is estimated to have infected 500,000 worldwide. is designed to steal financial and personal information from compromised PCs.

CryptoLocker locks victims out of their machines and encrypts their files before demanding a ransom, payable in BitCoins. An estimated 234,000 machines worldwide have been infected by CryptoLocker. Simply dismantling a zombie's control infrastructure is only part of the job because infected PCs still need to be disinfected.

Two weeks to protect yourselves... yes, especially you, XP users at the back

The UK’s National Crime Agency (NCA) warned Brits that they had “two weeks” to protect their computers following the disruption of CryptoLocker and the Gameover ZeuS botnet.

Past experience suggests that cybercrooks often successfully rebuild zombie networks. However, we can't really be sure if and when this would happen so the two-week deadline seems a bit arbitrary and even perhaps counterproductive.

The UK's ‪Get Safe Online site became difficult to reach on Tuesday morning in the aftermath of the NCA's cleanup advice, which pointed towards ‬getsafeonline.org/nca as the prime resource for information on cleaning up infected machines. "Please bear with us, we're working as hard as possible to restore our normal service providing free, expert online safety & security advice," GetSafeOnline said on Monday night in an update to its official Twitter profile.

Access remained patchy hours later on Tuesday midday, at the time of writing. Whether or not all this is due to the weight of extra (unplanned for) demand or something more nefarious isn't immediately clear.

Victims of Gameover ZeuS may alternatively use a micro-website created by DHS’s Computer Emergency Readiness Team (US-CERT) for help in removing the malware. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.