Attacks/Breaches
12/12/2012
09:53 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FBI, International Law Enforcement Disrupt International Organized Cybercrime Ring Related To Butterfly Botnet

Botnet linked to more than 11 million compromised computer systems and more than $850 million in losses

The Department of Justice and the FBI, along with international law enforcement partners, announced the arrests of 10 individuals from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the United Kingdom, and the United States and the execution of numerous search warrants and interviews.

The operation identified international cyber crime rings that are linked to multiple variants of the Yahos malicious software, or malware, which is linked to more than 11 million compromised computer systems and over $850 million in losses via the Butterfly Botnet, which steals computer users’ credit card, bank account, and other personal identifiable information.

“Botnet” is short for robot network; botnets are made up of compromised computer systems and can be utilized by cyber criminals to execute distributed denial of service attacks, send spam e-mails, and conduct underground organized criminal activity, to include malware distribution.

Facebook’s security team provided assistance to law enforcement throughout the investigation by helping to identify the root cause, the perpetrators, and those affected by the malware. Yahos targeted Facebook users from 2010 to October 2012, and security systems were able to detect affected accounts and provide tools to remove these threats.

The investigation was conducted by the FBI’s Cyber Division, International Operations Division, and the following field offices: Albany, Baltimore, Boston, Charlotte, Cincinnati, Cleveland, Dallas, El Paso, Honolulu, Jacksonville, Los Angeles, Milwaukee, New Haven, New Orleans, Norfolk, Philadelphia, Pittsburgh, Sacramento, San Diego, San Juan, St. Louis, Tampa, and Washington Field; the Department of Justice’s Computer Crime and Intellectual Property Section; the U.S. Attorney’s Office for the District of Hawaii; the U.S. Attorney’s Office for the Western District of Pennsylvania; and the U.S. Attorney’s Office for the District of Columbia.

The FBI received invaluable international cooperation, assistance, and response from the following partner organizations: Bosnia and Herzegovina’s Republika Srpska Ministry of Interior; Republic of Croatia, Ministry of Interior General Police Directorate, National Police Office for Suppression of Corruption and Organized Crime; New Zealand Police; Peruvian National Police; and the United Kingdom’s Serious Organised Crime Agency.

It is recommended that computer users update their applications and operating system on a regular basis to reduce the risk of compromise and perform regular anti-virus scanning of their computer system. It is also helpful to disconnect personal computers from the Internet when the machines are not in use. Computer users who believe they have been victimized should file a complaint with the FBI’s Internet Crime Complaint Center at www.ic3.gov.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.