The US Department of Justice on June 2 announced Operation Tovar, a global collaborative effort to disrupt the GameoverZeuS botnet -- responsible for hundreds of millions of dollars in bank theft and fraud. Perhaps more importantly, the operation took aim at the very underpinnings of the cybercrime industry -- the infrastructure criminals use to communicate and manage their ill-gotten gains.
Operation Tovar's plan of attack: Redirect the traffic from the bots so they can't report back to C&C servers, obtain the IP addresses of the infected machines, and share those addresses to help national CERTs and private industry assist victims in removing the GOZeuS malware from their computers.
Authorities said they could disrupt GOZeuS for about two weeks... and that time has now passed.
So... how's it going? In tomorrow's episode of Dark Reading Radio, find out how successful Operation Tovar has been thus far, how cyber criminals have responded, and what happens next.
Join us Wednesday, June 25, at 1:00 p.m. ET for a conversation with Adam Meyers, director of intelligence for CrowdStrike, one of the security companies that played a key part of Operation Tovar. Register now.
Have any questions for Adam you want me to ask? Let me know in the comments below or bring them along with you to the live chat during the radio show, when you can ask him yourself.