FBI's 'Bot Roast II' Leads To Alleged New Zealand Mastermind - InformationWeek
IoT
IoT
Software // Information Management
News
11/30/2007
04:42 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

FBI's 'Bot Roast II' Leads To Alleged New Zealand Mastermind

The teen's botnet group is responsible for taking control of more than 1 million computers through the use of malware, the FBI alleges.

Police in New Zealand this week searched the residence of an 18-year-old New Zealander believed to be the leader of an international group of botnet programmers known as the "A-Team."

The teen, not named because of his age, goes by the name "AKill" online, according to the FBI.

New Zealand police on Friday issued a statement saying that they're continuing to interview "AKill" and that the investigation is the first of its kind in the country.

The investigation is one of several arising from the FBI's Bot Roast II, the second stage of what began earlier this summer as national effort by the FBI and other law enforcement organizations to combat botnet cyber crime.

Botnets are groups of computers that have been hijacked by cyber criminals, usually through malware distributed via e-mail or malicious Web sites. They can be used to conduct denial of service attacks, to send spam, or to distribute malware or illegal content. According to the FBI, the majority of owners of compromised computers remain unaware that their PCs have been subverted to conduct cyber crime.

The FBI alleges that the teen's botnet group is responsible for taking control of more than 1 million computers through the use of malware. The agency said that it had uncovered over $20 million in economic harm since it launched its anti-bot initiative in June.

New Zealand police said the "A-Team" was believed to be responsible for installing malware on 1.3 million computers via the Netherlands. (The Netherlands, the third largest distributor of malware, was chosen due to its "superior data transmission infrastructure," according to New Zealand police.)

The "AKill" investigation arose out of an investigation conducted by the FBI's Philadelphia Office which recently resulted in the November 1 indictment of University of Pennsylvania student Ryan Goldstein, 21, of Ambler, Penn., for allegedly attempting to launch a denial of service attack through a botnet with "AKill."

Goldstein has pleaded not guilty and is free on bail pending his trial. University of Pennsylvania spokesperson Ron Ozio confirmed that Goldstein remains enrolled at the school and said that the damage arising from Goldstein's alleged actions was inconvenient but not irreparable.

"This case illustrates how law enforcement agencies around the world are rising to the challenge of fighting crime in cyberspace," said United States Attorney Patrick L. Meehan in a statement on Thursday. "As the Internet breaks down the barriers of national borders, collaborative efforts to find and prosecute the criminals become more crucial. This investigation and this indictment is proof of the commitment to meet that challenge."

The indictment against Goldstein contains one passage that suggests fears about the inadequacy of the signature-based model for antivirus protection are not misplaced. It quotes an excerpt of an IRC chat in which Goldstein allegedly offered access to an unreleased Trojan with "100% AV (antivirus) and FW (firewall) bypass."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll