Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/24/2012
03:59 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Names Alleged Botnet Operator Behind Kelihos

Russian suspect worked for antivirus and software development firms in Russia

Microsoft is continuing its legal tear against botnets: It has now named the botnet operator of the Kelihos botnet that it helped take down last fall.

The alleged perpetrator, Andrey N. Sabelnikov, a Russian engineer, has been added to Microsoft’s legal suit filed in U.S. District Court in September in relation to the botnet. The company, which worked with Kaspersky Lab and Kyrus to take down the spamming botnet, says the initial claim named co-defendants Dominique Alexander Piatti and dotFREE Group SRO in Microsoft’s civil lawsuit cooperated and provided information that led to the latest legal action against Sabelnikov as part of a settlement in October.

“In today’s complaint, Microsoft presented evidence to the court that Mr. Sabelnikov wrote the code for and either created, or participated in creating, the Kelihos malware. Further, the complaint alleges that he used the malware to control, operate, maintain and grow the Kelihos botnet. These allegations are based on evidence Microsoft investigators uncovered while analyzing the Kelihos malware,” said Richard Domingues Boscovich, senior attorney for Microsoft’s Digital Crimes Unit. “Microsoft also alleges that Mr. Sabelnikov registered more than 3,700 ‘cz.cc’ subdomains from Mr. Piatti and dotFREE Group SRO, and misused those subdomains to operate and control the Kelihos botnet.”

Microsoft says Sabelnikov lives in St. Petersburg, Russia, and is a contractor for a software development and consulting firm who once worked as a software engineer and project manager at a firewall and antivirus firm. According to KrebsOnSecurity, that firm was Agnitum.

The Kelihos botnet was a relatively small one of some 41,000 infected bots, but was used to spam, steal financial information, and wage distributed denial-of-service attacks; it was capable of sending 3.8 billion spam e-mails per day. It’s now inactive, but Microsoft says there are still thousands of computers infected with its bot malware.

Meanwhile, Microsoft’s initial lawsuit alleged that Piatti, dotFREE Group SRO, and John Does 1-22 owned and used the “cz.cc” domain to register other subdomains used in Kelihos.

“Our investigation showed that while some of the defendants’ subdomains may have been legitimate, many were being used for questionable purposes with links to a variety of disreputable online activities. On Oct. 26, we successfully settled with defendants Dominique Alexander Piatti and dotFREE Group, allowing us to dismiss the case against them. Today, thanks to their cooperation and new evidence, we have named a new defendant to the civil lawsuit we believe to be the operator of the Kelihos botnet,” Boscovich said.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/10/2020
Zscaler to Buy Cloudneeti
Dark Reading Staff 4/9/2020
Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days
Kelly Sheridan, Staff Editor, Dark Reading,  4/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Yes, I do have virus protection on my system, now what?
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11669
PUBLISHED: 2020-04-10
An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
CVE-2020-1801
PUBLISHED: 2020-04-10
There is an improper authentication vulnerability in several smartphones. Certain function interface in the system does not sufficiently validate the caller's identity in certain share scenario, successful exploit could cause information disclosure. Affected product versions include:Mate 30 Pro vers...
CVE-2020-3952
PUBLISHED: 2020-04-10
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
CVE-2020-4362
PUBLISHED: 2020-04-10
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerable to a privilege escalation vulnerability when using token-based authentication in an admin request over the SOAP connector. IBM X-Force ID: 178929.
CVE-2020-1802
PUBLISHED: 2020-04-10
There is an insufficient integrity validation vulnerability in several products. The device does not sufficiently validate the integrity of certain file in certain loading processes, successful exploit could allow the attacker to load a crafted file to the device through USB.Affected product version...