FBI: Operation Bot Roast finds 1 million botnet victims
Network World -
The FBI is working with industry partners, including the Computer Emergency Response Team Coordination Center at Carnegie Mellon University, to notify the owners of the victim computers. Microsoft Corp. and the Botnet Task Force have also helped the FBI. Through this process, the FBI may uncover additional incidents in which botnets have been used to facilitate other criminal activity, the FBI said in a statement.
The FBI and the Justice Department have a continuing cybercrime initiative to disrupt and dismantle botnets known as Operation Bot Roast. The results include the following:
- James C. Brewer of Arlington, Texas, is alleged to have operated a botnet that infected Chicago-area hospitals. This botnet infected tens of thousands of computers worldwide.
- Jason Michael Downey of Covington, Ken., is charged with using botnets to send a high volume of traffic to intended recipients to cause damage by impairing the availability of such systems.
- Robert Alan Soloway of Seattle, known as the "Spam King," is alleged to have used a large botnet network and sent tens of millions of unsolicited e-mail messages to advertise his Web site, from which he offered services and products.
Bots are widely recognized as one of the top scourges of the industry. Research firm Gartner Inc. predicts that by the end of the year, 75% of enterprises "will be infected with undetected, financially motivated, targeted malware that evaded traditional perimeter and host defenses."
Early reports from beta customers of a yet-to-be-released product from security vendor Mi5 Inc. show how nefarious these infections can be. Mi5 says it installed a Web security beta product at an organization with 12,000 nodes and in one month detected 22 active bots and 123 inactive bots and was watching another 313 suspected bots. Those bots were responsible for 136 million incidents, such as scanning for other hosts inside the firewall.
Google Inc. researchers recently said at least one in 10 Web pages is booby-trapped with malware. Google's Ghost in the Browser study looked at more than 4.5 million Web pages and found that 10% of them were capable of activating malicious codes and that 16% were suspected to contain codes that might be a threat to computers.
Most owners of the compromised computers are unknowing and unwitting victims. They have unintentionally allowed unauthorized access and use of their computers as a vehicle to facilitate other crimes, such as identity theft, denial-of-service attacks, phishing, click fraud, and the mass distribution of spam and spyware. Because of their widely distributed capabilities, botnets are a growing threat to national security, the national information infrastructure and the economy, the FBI said.
"The majority of victims are not even aware that their computer has been compromised or their personal information exploited," said James Finch, FBI assistant director for the Cyber Division. "An attacker gains control by infecting the computer with a virus or other malicious code, and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised."
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!