Update: Feds bust international gangs distributing scareware products
Two Latvian citizens, dozens of computers seized as part of Operation Trident Tribunal
Computerworld - Federal law enforcement authorities working in cooperation with their counterparts in more than 10 countries have disrupted the operations of two gangs responsible for distributing malicious scareware programs to more than 1 million people.
Two Latvian citizens have been indicted and more than 40 computers and several bank accounts have been seized in connection with the action dubbed Operation Trident Tribunal.
The two individuals face up to 20 years in prison if they are convicted on all charges.
Scareware products are malicious software programs that pose as legitimate security software. The programs are installed without permission on end user systems and are used to serve up a never-ending barrage of alerts warning users about non-existent threats on their systems and urging them to buy fake anti-malware products to resolve the issues.
The programs are designed to badger victims and to render their computers inoperable until they agree to provide their credit or debit card numbers to pay for the fake anti-malware products.
A statement issued by the FBI today said that Peteris Sahurovs, 22, and Marina Maslibojeva, 23, were arrested Tuesday in Rezekne, Latvia, for allegedly distributing and selling nearly $2 million worth of such scareware products.
The two have been charged with wire fraud, conspiracy to commit wire fraud and computer fraud.
An indictment unsealed in federal court in Minneapolis accused the two of creating a phony advertising agency and using it to plant a malicious advertisement in the Minneapolis Star Tribune with the intent of distributing scareware.
According to the indictment, the pair claimed to represent a hotel chain that wanted to place an advertisement in the Star Tribune. The two are alleged to have provided an electronic ad that the paper ran on its website after testing it and finding it to operate normally.
Sahurovs and Maslibojeva are accused of manipulating the advertisement after it began running so that the computers of those visiting the Star Tribune's website became infected with scareware. The malware caused users' computers to lock up and rendered their data inaccessible until they purchased the phony anti-malware product, the indictment said.
A statement released by the FBI said that law enforcement authorities had also disrupted operations of a separate criminal gang that was responsible for distributing scareware products.
The group is alleged to have distributed scareware products on more than 960,000 computers and netted $72 million from the sale of fraudulent anti-malware products.
Five bank accounts believed to belong to gang leaders have been seized by Latvian authorities.
In all, the Operation Trident Tribunal has resulted in the seizure of 22 computers in the U.S., and an additional 25 computers in the Netherlands, Latvia, Germany, France and other countries.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
- Target attack shows danger of remotely accessible HVAC systems
- U.S. is investigating Target data breach, AG Holder says
- Russian man pleads guilty in SpyEye malware case
- Suspected email hackers for hire charged in four countries
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts