Update: Feds bust international gangs distributing scareware products
Two Latvian citizens, dozens of computers seized as part of Operation Trident Tribunal
Computerworld - Federal law enforcement authorities working in cooperation with their counterparts in more than 10 countries have disrupted the operations of two gangs responsible for distributing malicious scareware programs to more than 1 million people.
Two Latvian citizens have been indicted and more than 40 computers and several bank accounts have been seized in connection with the action dubbed Operation Trident Tribunal.
The two individuals face up to 20 years in prison if they are convicted on all charges.
Scareware products are malicious software programs that pose as legitimate security software. The programs are installed without permission on end user systems and are used to serve up a never-ending barrage of alerts warning users about non-existent threats on their systems and urging them to buy fake anti-malware products to resolve the issues.
The programs are designed to badger victims and to render their computers inoperable until they agree to provide their credit or debit card numbers to pay for the fake anti-malware products.
A statement issued by the FBI today said that Peteris Sahurovs, 22, and Marina Maslibojeva, 23, were arrested Tuesday in Rezekne, Latvia, for allegedly distributing and selling nearly $2 million worth of such scareware products.
The two have been charged with wire fraud, conspiracy to commit wire fraud and computer fraud.
An indictment unsealed in federal court in Minneapolis accused the two of creating a phony advertising agency and using it to plant a malicious advertisement in the Minneapolis Star Tribune with the intent of distributing scareware.
According to the indictment, the pair claimed to represent a hotel chain that wanted to place an advertisement in the Star Tribune. The two are alleged to have provided an electronic ad that the paper ran on its website after testing it and finding it to operate normally.
Sahurovs and Maslibojeva are accused of manipulating the advertisement after it began running so that the computers of those visiting the Star Tribune's website became infected with scareware. The malware caused users' computers to lock up and rendered their data inaccessible until they purchased the phony anti-malware product, the indictment said.
A statement released by the FBI said that law enforcement authorities had also disrupted operations of a separate criminal gang that was responsible for distributing scareware products.
The group is alleged to have distributed scareware products on more than 960,000 computers and netted $72 million from the sale of fraudulent anti-malware products.
Five bank accounts believed to belong to gang leaders have been seized by Latvian authorities.
In all, the Operation Trident Tribunal has resulted in the seizure of 22 computers in the U.S., and an additional 25 computers in the Netherlands, Latvia, Germany, France and other countries.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is email@example.com.
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
Read more about Security in Computerworld's Security Topic Center.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!