. Military Space News .




.
CYBER WARS
Hacker 'command' servers seized in US: Microsoft
by Staff Writers
San Francisco (AFP) March 26, 2012


Microsoft on Monday said that cyber crime "command" servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen.

The software colossus capitalized on laws crafted to fight organized crime groups to obtain court orders to seize servers in Pennsylvania and Illinois being used to control computers corrupted by malicious code.

Viruses slipped into people's computers stole online bank account and password information and relayed it to crooks who have looted more than $100 million in the past five years, according to court documents.

The "worldwide, illegal" computer networks were an amalgam of more than 13 million infected machines referred to as "Zeus botnets" due to the type of malicious code involved.

Zeus malware is designed to log keystrokes typed on computers, watching for patterns that indicate information about online bank accounts.

"A number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization," Microsoft digital crimes unit senior attorney Richard Boscovich said in a blog post.

The seizure of "command and control" servers by Microsoft employees escorted by police on Friday was the latest move by the industry to cut elusive cyber criminals off from infected computers used to do their bidding.

Microsoft six months ago took down a "botnet" believed to have been used for nefarious activities including spam, stock scams, and sexual exploitation of children, and sued the owner of an online domain used to control operations.

The disrupted "Kelihos" network was an apparent reincarnation of the first botnet Microsoft took down with a combination of legal and technical tactics.

A year ago, Microsoft dismantled a "notorious and complex" network of virus-infected computers used to send billions of email messages daily hawking fake drugs.

That Rustock "botnet" consisted of about a million computers that were infected with malicious code to let hackers covertly control the machines from afar using "command and control" servers.

Owners of infected computers are typically not aware that hackers are using their devices.

Cutting hackers off from online servers that act as intermediaries, collecting data from and giving orders to armies of infected "zombie" computers, is a creative new tactic in the war on cyber crime.

The raids on office buildings in Pennsylvania and Illinois on Friday involved federal court warrants obtained under different laws, including a racketeering act designed to fight the Mafia.

Microsoft has teamed up with industry allies and law enforcement agencies to destroy spam or crime spewing botnets to defend the reputation and reliability of the software on which the US technology company's fortune is based.

"Microsoft has invested substantial resources in developing high quality products and services," the company said in court documents.

"Microsoft has generated substantial goodwill with its customers, establishing a strong brand and developing the Microsoft name and the names of its products and services into strong and famous world-wide symbols."

Microsoft resorted to US civil courts to get legal backing to take out the two major botnets last year in a strategy implemented by Boscovich, a former federal prosecutor.

The tactic has been compared to those used by neighborhood watch groups -- ordinary citizens who alert police to suspicious activities.

Hackers cut off from armies of infected computers can regroup and marshal new forces, or adapt viruses to frequently switch command servers or connect, peer-to-peer style, through other tainted machines.

"Identifying command-and-control servers has really come of age in the past year as something that is getting wide attention, especially in the realm of persistent threats," said McAfee Labs senior research analyst Adam Wosotowsky.

"While this surely doesn't put an end to phishing or Zeus-based infections, it should deal a strong blow to botmasters who monetize their infections through thievery," he said.

However, the stepped up US raids could lead hackers to simply relocate to other countries, he added.

"In the struggle between botnets and the security community this is equivalent to a handful of cruise missiles pounding an enemy base," he said.

"It's not the end of the war, but it is a definite statement that our knowledge of the threats has improved to the point where we can target the enemy strongholds."

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
China bloggers skirt censors with noodles, Teletubbies
Beijing (AFP) March 23, 2012
Chinese web users frustrated by the blocking of sensitive terms have come up with a system of bizarre code words to allow them to post on a political saga that has gripped the blogosphere. China blocks all information deemed sensitive under a vast censorship system known as the "Great Firewall", but the huge rise of weibos - microblogs similar to Twitter - is making this task increasingly ... read more


CYBER WARS
Pentagon backs expanding Israel's anti-rocket defenses

First New-production Patriot System Debuts in Flight Test

Obama asks Russia for 'space' on missile defence

S. Korea to shoot down N. Korea rocket if it strays

CYBER WARS
Lockheed Martin Receives THAAD Follow-On Development Contract

Tucson site is largest Raytheon facility to receive a superior rating

Lockheed Martin Upgrades Tactical Tomahawk Weapons Control System for Naval Air Systems Command

Raytheon Wins $77.9 Million US Army Missile Subsystem Support Contract

CYBER WARS
NASA Flight Tests New ADS-B Device on Ikhana UAS

NRL Tests Robotic Fueling of Unmanned Surface Vessels

Russia to build mini drone

Israel assesses eye-in-the-sky platforms

CYBER WARS
Raytheon to Continue Supporting Coalition Forces' Information-Sharing Computer Network

Northrop Grumman Wins Contract for USAF Command and Control Modernization Program

TacSat-4 Enables Polar Region SatCom Experiment

'See Me' satellites may help ground forces

CYBER WARS
Canada mulls replacing aging CF-18 jets

Embraer selects AdaCore for jet upgrade

US Army reviews mental health diagnoses

Peru upgrades air defense with $140M plan

CYBER WARS
Italian giant Finmeccanica posts 2.3 bn euro loss for 2011

Brazil's Rousseff to weigh French jet buy in India

Delhi boosts military spending 17 percent

Prison sentence for espionage scientist

CYBER WARS
Graft main threat to Communist Party: China's Wen

Obama to meet Hu after blunt words on North Korea

Lavrov: Putin, Obama to meet in May

Ex-spy boss may spill Gadhafi's secrets

CYBER WARS
'Buckliball' opens new avenue in design of foldable engineering structures

A shiny new tool for imaging biomolecules

Simple, cheap way to mass-produce graphene nanosheets

New technique lets scientists peer within nanoparticles


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement