Original URL: https://www.theregister.com/2005/11/04/suspected_bot_master_busted/

Suspected bot master busted

First America

By Robert Lemos, SecurityFocus

Posted in Channel, 4th November 2005 08:59 GMT

In what prosecutors have labeled the first case of its kind in the nation, a federal grand jury charged Jeanson James Ancheta with 17 counts of conspiracy and computer crime stemming from his alleged profitable use of bot nets. Over nearly a year, Ancheta allegedly used automated software to infect Windows systems, advertised and sold access to the compromised PCs, and used the software to perpetrate click fraud, garnering tens of thousands of dollars in affiliate fees, according to a 58-page indictment released on Thursday.

"This is the first case to charge someone for using bots for generating profits," said James Aquilina, Assistant U.S. Attorney for the Central District of California and the prosecutor on the case."On the one hand, he is selling bots to other people so that they can (perform) denial-of-service attacks and spam to make money. And on the other hand, he is using bots to make affiliate income."

The arrest comes as authorities are turning up the heat on bot herders, the name for people that control millions of compromised computers worldwide. In October, Dutch authorities arrested three men in the Netherlands who allegedly controlled a network of more than 1.5 million compromised computers. In August, the FBI and Microsoft helped authorities in Turkey and Morocco track down two men suspected of creating and spreading the Zotob worm--a program that consisted of bot software modified to exploit a flaw in Windows 2000.

The arrests have driven some developers of bot software underground, but many security researchers are doubtful that convictions in the cases will significantly reduce the threat. One reason: Bot software increasingly forms the core of the newest worms, such as Zotob, because the programs only need the exploit for the latest vulnerability to start spreading among computer systems.

However, previous cases have focused on other aspects of the crimes, not the actual underground trade in compromised computers, Aquilina said.

The latest case stems from two separate investigations into bot software. During the summer 2004, investigators started looking into an advertisement posted in the Internet Relay Chat (IRC) channel #botz4sale that linked to a price list for buying compromised computers. And in late 2004 and early 2005, computers at the Defense Information Security Agency (DISA) and the Weapons Division of the U.S. Naval Air Warfare Center in China Lake, California, became infected with bot software.

“ This is the first case to charge someone for using bots for generating profits. On the one hand, he is selling bots to other people so that they can (perform) denial-of-service attacks and spam to make money. And on the other hand, he is using bots to make affiliate income. ”

James Aquilina, Assistant U.S. Attorney, Central District of California

Prosecutors soon determined that a single person was behind both events and quickly focused on Ancheta. In raids executed in December 2004 and in May 2005 on Ancheta's Downey, California residence, prosecutors seized three computers and discovered chat logs that described numerous sales of small numbers of bots and the success of an alleged collaboration with a Florida man to garner affiliate fees through click fraud.

According to the indictment, Ancheta created a customized version of a publicly available bot software package known as "rxbot". He allegedly used the software to infect nearly 400,000 systems. While he made nearly $3,000 selling hundreds or thousands of compromised machines to would-be bot herders, the vast majority of his profit was from installing adware on the compromised systems and using them to generate pay-for-click affiliate fees, according to the indictment.

Ancheta allegedly received checks from GammaCash, an affiliate program run by Gamma Entertainment, and from LOUDcash, a program run by CDT, which was acquired by advertising firm 180solutions. Renamed Zango in April, 180solutions' CDT subsidiary had already canceled Ancheta's account, according to company spokesman Sean Sundwall.

The Bellevue, Washington-based company, whose past advertising tactics gained the ire of many Internet users, has aggressively pursued click fraudsters, Sundwall said.

On Thursday, the company announced that it had cooperated with the FBI in a separate investigation against the three Dutch men arrested in October on charges of controlling 1.5 million compromised PCs. While the company had not worked with the FBI and Department of Justice on the latest case, executives extended the offer to help, he said.

The company has also created a more secure version of its advertising software that should prevent the program from being installed without a computer users' knowledge, Sundwall said. The software will be released before the end of the year.

"We are aiming to remove any financial incentive (for fraudsters) to do this sort of thing," he said.

Ancheta appeared briefly in court on Thursday and is being held pending post-indictment arraignment on Monday and a bail hearing set for Tuesday, Assistant U.S. Attorney Aquilina said.

If found guilty of all charges, Ancheta could be sentenced to a maximum of 50 years in prison.

Copyright © 2005, SecurityFocus