US law enforcement busts cybercrime rings with help from Facebook
The malware infected more than 11 million computers and caused $850 million in losses, according to the FBI
IDG News Service - U.S. law enforcement agencies with the help of Facebook have arrested 10 people from various countries in connection with international cybercrime rings that targeted users on the social network.
The operation is said to have identified international cybercrime rings that used variants of a malware called Yahos. The malware infected more than 11 million computers and caused more than $850 million in losses through a Butterfly botnet, which steals computer users' credit card, bank account, and other personal identifiable information, the FBI said in a statement late Tuesday.
The 10 people arrested are from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the U.K. and the U.S.
Botnets are networks of computers that have been compromised by malware, and can be controlled remotely by cybercriminals to execute a variety of attacks including distributed denials of service.
Facebook's security team assisted the law enforcement agencies in the investigation by helping "to identify the root cause, the perpetrators, and those affected by the malware," the FBI said. Yahos targeted Facebook users from 2010 to October this year, and security systems were able to detect affected accounts and provide tools to remove these threats, FBI said.
Besides the FBI and the U.S. Department of Justice, law enforcement agencies from other countries were also involved in the operation.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!