. 24/7 Space News .
Analysis: Global cyber-crime case cracked

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Dec 4, 2007
The investigation of a relatively minor computer crash at the University of Pennsylvania last year led law enforcement agencies from three countries to a multimillion-dollar cyber-crime syndicate writing computer viruses to order and renting out networks of millions of compromised slave PCs to other online criminals.

According to investigators and court documents, the cases that arose out of the February 2006 incident, in which computers at the university crashed after being used to store hacker programs, represent both ends of the spectrum of cyber-crime: from the disgruntled student to the sophisticated organized crime syndicate.

Ryan Goldstein, the Pennsylvania student known by the login ID Digerati who was indicted last month for causing the crash and for conspiring to launch Internet attacks against several Web discussion forums from which he had been barred, was essentially a cyber-vandal out for revenge rather than a criminal seeking to profit from his work, say investigators.

Goldstein has pleaded not guilty and faces trial in March next year. If convicted, he faces a maximum of five years in jail and a $250,000 fine.

"The computer intrusions (Goldstein is charged with) were basically destructive nuisance attacks," Jerria Williams, spokeswoman for the FBI in Philadelphia, told United Press International.

But at the other end of the investigation lies the burgeoning world of online organized cyber crime, in which multinational gangs, often made up of people who know each other only by their screen names or login IDs, collaborate to steal passwords and bank account information from unsuspecting computer users; scam marketing schemes; and target researchers trying to develop anti-virus software.

Owen Walker, the 18-year-old with the screen name AKill who was arrested and had his computer seized last week by police in Waikato, New Zealand, was described by investigators there in a statement as the alleged head of an elite international cyber-crime ring known as the A-Team.

Walker has not been charged with any crime yet, but police say their inquiries are continuing.

Staff at the University of Pennsylvania first alerted the Philadelphia office of the FBI after hacker software was found on a server at the School of Engineering and Applied Sciences. The server crashed Feb. 26 after receiving 70,000 requests from other computers to download the program, which turned out to be a new target package for a hacker-controlled botnet.

Botnets, short for robot networks, are collections of computers that -- often unknown to their owners, who tend to be less computer-savvy or careful individuals -- have been compromised by hacker programs known as malware, short for malicious software.

The programs turn the infected computers into virtual slaves for hackers, known as bot-herders, who can use them to send spam e-mail, mount Internet attacks or commit other kinds of cyber crime. The computers are often also infected with programs known as key-stroke loggers that can steal passwords and other account information from users and send it back to the bot-herder.

Botnets can be used to mount the crudest form of cyberattack, called Distributed Denial of Service attacks, in which the thousands of slave computers overwhelm the server hosting a Web site or other target by flooding it with fake Internet traffic.

But in order to launch such an attack, the slave computers must each download targeting instructions and other malware. Since botnets can contain tens or even hundreds of thousands of computers, the downloads generate very heavy traffic, requiring a large-capacity server to handle it.

According to Patricia Hartman, a spokesman for the U.S. Attorney for the Eastern District of Pennsylvania, Goldstein prevailed upon Walker to use his botnet to launch DDoS attacks on several Internet discussion forums from which he had been banned.

The New Zealand hacker told him "basically, 'I can do it, but I need a place to load this software,'" said Hartman.

Martin Kleintjes, head of the New Zealand police's Electronic Crime Center, described Walker as "one of the world leaders" in developing malware.

"He's very bright, very skilled at what he's doing," he told a radio interviewer last week.

And indeed, when his software turned up on the university server, it raised some eyebrows. "This program was viewed by the FBI as being very sophisticated," said Detective Inspector Peter Devoy of the Waikato police.

Kleintjes said investigators from the FBI, New Zealand police and the Dutch Independent Post and Telecommunications Authority had been able to use Goldstein's messages to Walker to track him down.

"There's this misconception out there that people can remain anonymous (on the Web), but that's not the case," he said. "The surveillance technology allows us to look at Internet traffic in between countries and work our way back" to the perpetrators.

He said that Walker had been "head of an international spy(ware) and bot ring" that had "infiltrated a large number of computers around the world with their malicious software" allowing "other cyber criminals �� who hire his services" to carry out "other types of cyber crime."

The U.S. indictment suggests that the botnet Walker used to help Goldstein was made up of at least 70,000 computers -- the number that tried over a four-day period to download the target package stored on the University of Pennsylvania server.

But New Zealand police say a separate investigation had linked Walker with a malware scheme based in the Netherlands, alleged to have infected 1.3 million computers world wide.

"The Netherlands is the world's third-largest distributor of malware and was chosen because of its superior data transmission infrastructure," said a statement.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Analysis: A new USAF cyber-war doctrine
Washington (UPI) Oct 17, 2007
Recent pronouncements by U.S. Air Force officials about their view of cyberspace as a war-fighting domain have attracted little attention. But the questions they raise for U.S. military policy and doctrine are profound.







  • MU Engineers Develop Software Solution For Complex Space Missions
  • Computer predicts Voyager 2 milestone
  • Star Talk
  • Computer Simulation Predicts Voyager 2 Will Reach Major Milestone In Late 2007�Early 2008

  • Spirit Breaks Free In Race For Survival
  • Multi-Tasking Rover Supports Multiple Missions
  • Noctis Labyrinthus, Labyrinth Of The Night
  • Rover Perseveres Despite Stall In Robotic Arm

  • Arianespace warns US over Chinese space 'dumping'
  • Sea Launch Reschedules The Thuraya-3 Launch Campaign
  • Sea Launch Reschedules The Thuraya-3 Launch Campaign
  • Thuraya-3 Satellite Launch Delayed Again

  • Use Space Technology And IT For Rural Development
  • Ministerial Summit On Global Earth Observation System Of Systems
  • China, Brazil give Africa free satellite land images
  • NASA-Conceived Map Of Antarctica Lays Ground For New Discoveries

  • The PI's Perspective: Autumn 2007: Onward to the Kuiper Belt
  • Data For The Next Generations
  • Goddard Instrument Makes Cover Of Science
  • Checking Out New Horizons

  • UBC Astronomers Discover How White Dwarf Stars Get Their Kicks
  • Dark Matter In Newborn Universe Doused Earliest Stars
  • Dark Energy -- 10 Years On
  • An X-Ray Santa Claus In Orion

  • China Will Soon Have Its Own Moon Globe
  • Northrop Grumman Starts Integration And Test On LCROSS Spacecraft
  • Data From Chinese Lunar Orbiter Available To All
  • KAGUYA (SELENE) Composes 3-D Movies With Terrain Camera Images

  • EU rallies Spain to clinch unanimous Galileo deal
  • EU nations 'close' to political agreement on satnav project
  • EU antitrust regulators to probe GPS devices deal
  • EU satnav project edges towards launch pad

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement