Three indicted for making, spreading Gozi Trojan
Malware was used to steal millions of dollars from U.S., offshore bank accounts, since 2006
Computerworld - Three individuals were indicted in New York Wednesday for allegedly creating and distributing the Gozi malware that's said to have caused tens of million of dollars in losses at several major U.S. banks.
U.S. Attorney Preet Bharara said indictments were filed today against Nikita Kuzmin, Mihai Paunescu and Deniss Calovskis today.
The trio is alleged to have conspired to steal at least $50 million from online bank accounts of people whose computers were hit with the Gozi virus.
The indictments alleged that the three individuals, described as software experts, used Gozi to infect at least 100,000 computers around the world, including 25,000 in the United States.
The U.S. Attorney's office says Kuzmin, a Russian citizen, was the chief architect of the virus. The indictment alleges that Kuzmin created a list of master specifications for the Gozi malware in 2005. The malware was created by a partner based on the specs.
Kuzmin is alleged to have started renting the Gozi code by the week to cybercrimnals starting in 2006. The lease operation was called "76 Service", according to the complaint.
The initial Gozi attacks mostly targeted customers of European banks.
In 2009, according to the indictment, Kuzmin was approached by unnamed co-conspirators seeking to use the Gozi malware to attack customers of American banks.
Kuzmin sold the Gozi source code to the co-conspirators for approximately $50,000 plus a share of the profits.
Kuzmin faces seven criminal charges related to wire fraud, access device fraud and computer intrusion.
The court papers say Paunescu provided the infrastructure for the operation.
Paunescu, a Romanian national based in Bucharest, operated a so-called "bullet-proof" hosting service using computers housed in Romania, the United States and other countries.
The complaint says Paunescu provided Kuzmin and others with servers and IP addresses that allowed them to use and distribute Gozi and other banking Trojans such, as Zeus and SpyEye, with relative anonymity.
The court papers also allege Paunescu's rented servers hosted the tools used to launch distributed denial of service attacks, including several that took advantage of the infamous Black Energy botnet. The server were often used as command and control servers for botnets and as proxy systems that let attackers to hide their identities, the complaint said.
Calovskis, a Latvian national, was indicted on charges of developing a web injection code that was used to alter how banking websites appeared on infected computers. The software fooled victims into providing key security information such as their mother's social security number and mother's maiden name when they attempted to log into their bank's website.
The information was later used to steal funds from victim accounts, the complaint alleged.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, send e-mail to email@example.com or subscribe to Jaikumar's RSS feed .
- Kicking the stool out from under the cybercrime economy
- Chinese man indicted over theft of Boeing C-17 secrets
- The making of a cybercrime market
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts