Three indicted for making, spreading Gozi Trojan
Malware was used to steal millions of dollars from U.S., offshore bank accounts, since 2006
Computerworld - Three individuals were indicted in New York Wednesday for allegedly creating and distributing the Gozi malware that's said to have caused tens of million of dollars in losses at several major U.S. banks.
U.S. Attorney Preet Bharara said indictments were filed today against Nikita Kuzmin, Mihai Paunescu and Deniss Calovskis today.
The trio is alleged to have conspired to steal at least $50 million from online bank accounts of people whose computers were hit with the Gozi virus.
The indictments alleged that the three individuals, described as software experts, used Gozi to infect at least 100,000 computers around the world, including 25,000 in the United States.
The U.S. Attorney's office says Kuzmin, a Russian citizen, was the chief architect of the virus. The indictment alleges that Kuzmin created a list of master specifications for the Gozi malware in 2005. The malware was created by a partner based on the specs.
Kuzmin is alleged to have started renting the Gozi code by the week to cybercrimnals starting in 2006. The lease operation was called "76 Service", according to the complaint.
The initial Gozi attacks mostly targeted customers of European banks.
In 2009, according to the indictment, Kuzmin was approached by unnamed co-conspirators seeking to use the Gozi malware to attack customers of American banks.
Kuzmin sold the Gozi source code to the co-conspirators for approximately $50,000 plus a share of the profits.
Kuzmin faces seven criminal charges related to wire fraud, access device fraud and computer intrusion.
The court papers say Paunescu provided the infrastructure for the operation.
Paunescu, a Romanian national based in Bucharest, operated a so-called "bullet-proof" hosting service using computers housed in Romania, the United States and other countries.
The complaint says Paunescu provided Kuzmin and others with servers and IP addresses that allowed them to use and distribute Gozi and other banking Trojans such, as Zeus and SpyEye, with relative anonymity.
The court papers also allege Paunescu's rented servers hosted the tools used to launch distributed denial of service attacks, including several that took advantage of the infamous Black Energy botnet. The server were often used as command and control servers for botnets and as proxy systems that let attackers to hide their identities, the complaint said.
Calovskis, a Latvian national, was indicted on charges of developing a web injection code that was used to alter how banking websites appeared on infected computers. The software fooled victims into providing key security information such as their mother's social security number and mother's maiden name when they attempted to log into their bank's website.
The information was later used to steal funds from victim accounts, the complaint alleged.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, send e-mail to firstname.lastname@example.org or subscribe to Jaikumar's RSS feed .
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts