World still standing? It's been two weeks since Cryptolocker, Gameover Zeus takedown by feds

Shouldn't it be cats and dogs living together, mass hysteria?

Website security in corporate America

Two weeks have passed since the feds knackered the systems doling out the GameOver ZeuS and CryptoLocker malware to PCs.

G-men warned us the world had just a fortnight to clean up compromised Windows machines and defend them from the software nasties before their masters regrouped. That time has passed ... and not much has changed.

The National Crime Agency (NCA) – the UK police team that came up with the estimate of 14 days – reckons there's "still time" for computer users to protect themselves from GameOver ZeuS and CryptoLocker.

An FBI-led operation on 2 June "disrupted" the global network of infected computers, providing netizens an opportunity to rid themselves of infamous nasties and prevent future infection while the command-and-control infrastructure was weakened.

Botnet takedowns are not uncommon, and the crooks running the networks normally rebuild, often by regaining control of compromised machines: taking out the control systems leaves behind thousands of infected PCs. These systems still need to be disinfected, preferably sooner rather than later.

But the two-week countdown set up by NCA was arbitrary, and perhaps even a bit mishandled. Its original alert pointed surfers seeking more information to the GetSafeOnline site, which (perhaps predictably) crashed under the load.

GameOver ZeuS is primarily designed to infect Windows PCs and steal victims' online banking passwords. Over recent months, machines infected by the software nasty have been used as a platform to distribute tCryptoLocker, which automatically encrypts a victim's files and refuses to decrypt the data unless a ransom running to hundreds of pounds is paid in Bitcoin.

"Indications are that UK GoZeuS [GameOver ZeuS] and CryptoLocker infections have reduced since 2 June, but thousands of systems remain affected or at risk," an NCA statement on the latest situation explained.

Nearly quarter of a million computers pwned

About 234,000 computers worldwide, half in the US, have been infected with CryptoLocker since its debut in September 2013. Victims have been rinsed of $27m (£16m) as a result, according to FBI estimates. GameOver ZeuS is estimated to have pulled in $100m in illicit income.

Brits who reckon they lost money through malware such as GoZeuS and CryptoLocker should report it to Action Fraud.

Evgeniy Mikhailovich Bogachev has been charged with allegedly masterminding the distribution of GameOver ZeuS and CryptoLocker. The 30-year-old Russian national has been placed on an FBI wanted list over the alleged cybercrimes.

Amid the hunt for the alleged perp, security vendors remain critical of the two-week cleanup deadline suggested by NCA.

Amichai Shulman, CTO of security tools firm Imperva, explained: “I think that more than anything this announcement puts emphasis on the poor posture law enforcement has with respect to cybercrime.

"Imagine the local police announcing a two-week grace period in which the local gangs are 'weakened' (with no further explanation) and urging everyone to use this grace period for installing improved window bars, more sophisticated alarm systems and in general be more cautious when they leave their homes after the grace period is over. This is absurd.

“Repelling cybercrime is not the responsibility of individuals. This ritual of botnet takedown announcements (remember Cutwail?) has been repeating itself for too long."

Dwayne Melancon, CTO of Tripwire, reckoned people should realise they are largely to blame for the mess.

“The majority of the public haven’t been paying attention to this issue, which is how we got into this situation in the first place," Melancon said. "Many of the recommended actions fall into the category of 'good hygiene' in the computing sense, but it is notoriously hard to get the average user to keep things secure and up to date."

Other security experts criticised NCA's advice as lacking in detail and too "generic".

David Harley, senior research fellow at antivirus firm ESET, explained: “The advice that’s been circulated is, as far as I can see, highly generic: use security software and keep it updated, make sure your systems are being patched, use good password management practice. Good advice in principle, but I suspect that in general, people who aren’t doing all that already are probably not going to start doing it because CERTs or the FBI are recommending it.

"After all, security commentators make the same recommendations that tend to be made for self-protection even when there is no specific hot story to hang it on." ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story


Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.