|
. | . |
|
by Staff Writers Washington (AFP) June 02, 2014 An international dragnet has dismantled a global computer hacker network which used a sophisticated computer virus to steal millions of dollars from companies and consumers, the US Justice Department announced Monday. Gameover Zeus, which first appeared in September 2011, stole bank information and other confidential details from victims. According to FBI investigators, the virus infected between 500,000 and a million computers in 12 countries, creating a network of "bots" the hackers could "infiltrate, spy on, and even control, from anywhere they wished." "Gameover Zeus is the most sophisticated botnet the FBI and our allies have ever attempted to disrupt," said FBI Executive Assistant Director Anderson. The FBI blamed the Gameover Zeus botnet for the theft of more than $100 million, obtained by using the stolen bank data and then "emptying the victims' bank accounts and diverting the money to themselves." The bust also targeted another computer virus, dubbed "Cryptolocker," which appeared in September 2013. The virus encrypted the computers of its victims and demanded a ransom -- often in excess of $700 -- in exchange for the password to unlock it. Investigators say the cyber criminals amassed more than $27 million in just the first two months. Russian Evgeniy Mikhailovich Bogachev, 30, an alleged administrator of the network, was charged in Pittsburgh, Pennsylvania, with 14 counts including conspiracy, computer hacking, bank fraud and money laundering in the Gameover Zeus and Cryptoblocker schemes. Bogachev, sometimes called "Slavik" or "Pollingsoon," was also charged in Omaha, Nebraska with "conspiracy to commit bank fraud" in relation to an earlier incarnation of Gameover Zeus. "Evgeniy Bogachev and the members of his criminal network devised and implemented the kind of cyber crimes that you might not believe if you saw them in a science fiction movie," said Leslie Caldwell, deputy attorney general. US investigators worked with counterparts in Australia, the Netherlands, Germany, France, Italy, Japan, Luxemburg, New Zealand, Canada, Ukraine, and Britain, as well as the European Cybercrime Center, according to a statement. They were also aided by private companies, including Dell, Microsoft, Afilias, Deloitte and Symantec. Victims are urged to contact a site created by the Department of Homeland Security: https://www.us-cert.gov/gameoverzeus
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |