Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets
Botnet ZeuS, SpyEye, Ice-IX
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group Operation b71
Vulnerability
CCProtocol
Date 2012 / 25 mars 2012
Editor/Conference Microsoft
Link http://blogs.technet.com/b/microsoft blog/archive/2012/03/25/microsoft-and-financial-services-industry-leaders-target-cybercriminal-operations-from-zeus-botnets.aspx (Archive copy)
Author Richard Domingues Boscovich
Type

Abstract

In our most complex effort to disrupt botnets to date, Microsoft’s Digital Crimes Unit – in collaboration with Financial Services – Information Sharing and Analysis Center (FS-ISAC) and NACHA – The Electronic Payments Association, as well as Kyrus Tech Inc. – has executed a coordinated global action against some of the worst known cybercrime operations fueling online fraud and identity theft today. With this legal and technical action, a number of the most harmful botnets using the ZeuS family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization.


As you may have read, after a months-long investigation, successful pleading before the U.S. District Court for the Eastern District of New York and a coordinated seizure of command and control servers in Scranton, Penn. and Lombard, Ill., some of the worst known ZeuS botnets were disrupted by Microsoft and our partners worldwide. Valuable evidence and intelligence gained in the operation will be used both to help rescue peoples’ computers from the control of ZeuS, as well as in an ongoing effort to undermine the cybercriminal organization and help identify those responsible.

Cybercriminals have built hundreds of botnets using variants of ZeuS malware. For this action – codenamed Operation b71 – we focused on botnets using ZeuS, SpyEye and Ice-IX variants of the ZeuS family of malware, known to cause the most public harm and which experts believe are responsible for nearly half a billion dollars in damages. Due to the unique complexity of these particular targets, unlike our prior botnet takedown operations, the goal here was not the permanent shutdown of all impacted targets. Rather, our goal was a strategic disruption of operations to mitigate the threat in order to cause long-term damage to the cybercriminal organization that relies on these botnets for illicit gain.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR954,
   editor = {Microsoft},
   author = {Richard Domingues Boscovich},
   title = {Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets},
   date = {26},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://blogs.technet.com/b/microsoft_blog/archive/2012/03/25/microsoft-and-financial-services-industry-leaders-target-cybercriminal-operations-from-zeus-botnets.aspx}},
 }


La vidéo de l'intervention ici: http://www.youtube.com/watch?v=hqPmrWHkeTQ