it is an unusual step for the police to criminal machines take U.S. crime-fighters in a corridor behind a huge botnet to close control over the criminal server.It is the first time FBI investigators such a method have used.
The US Justice Department had to seek court permission by a judge to carry out the sting.
It enabled the authorities a your own commands, order effectively stops malware. It logs also IP addresses of compromised machines.
It means, that the authorities can be ISPs notify of the machines infected were and ISPs in turn let victims know that their machines had taken over.
A similar approach was used in the past year by the Dutch police in the context of its closure the Bredolab botnet.
At the time, privacy experts of such doubts.
Millions have recruitedA botnet is a network of infected computers, also known as zombie PCs.
Coreflood, the malware program calls the FBI investigation, can has existed for at least ten years and key strokes, so that criminals to take unsuspecting computers and steal passwords, banks and credit card information.
It will have believed, recruited to 2.3 million machines and raked in millions for those behind it.
Officials have not said where the attacks came, although is displayed you with cyber-crime activity in Eastern Europe.
Investigators seized five of the botnet servers, hundreds of thousands of infected computer were control.
Seized also 29 the botnet used domain name.
"As a result of zombie computers in the network Coreflood controlled by law enforcement agencies, are redirected to communicate with the server", explains Noa bar-Yosef, a senior strategist at security firm Imperva.
"The 'good' server may then terminate commands run the malware running on the compromised computers."
没有评论:
发表评论