U.S. disrupts major hacking, extortion ring; Russian charged - News and Current Events | futures io social day trading
futures io futures trading


U.S. disrupts major hacking, extortion ring; Russian charged
Updated: Views / Replies:285 / 0
Created: by kbit Attachments:0

Welcome to futures io.

(If you already have an account, login at the top of the page)

futures io is the largest futures trading community on the planet, with over 90,000 members. At futures io, our goal has always been and always will be to create a friendly, positive, forward-thinking community where members can openly share and discuss everything the world of trading has to offer. The community is one of the friendliest you will find on any subject, with members going out of their way to help others. Some of the primary differences between futures io and other trading sites revolve around the standards of our community. Those standards include a code of conduct for our members, as well as extremely high standards that govern which partners we do business with, and which products or services we recommend to our members.

At futures io, our focus is on quality education. No hype, gimmicks, or secret sauce. The truth is: trading is hard. To succeed, you need to surround yourself with the right support system, educational content, and trading mentors – all of which you can find on futures io, utilizing our social trading environment.

With futures io, you can find honest trading reviews on brokers, trading rooms, indicator packages, trading strategies, and much more. Our trading review process is highly moderated to ensure that only genuine users are allowed, so you don’t need to worry about fake reviews.

We are fundamentally different than most other trading sites:
  • We are here to help. Just let us know what you need.
  • We work extremely hard to keep things positive in our community.
  • We do not tolerate rude behavior, trolling, or vendors advertising in posts.
  • We firmly believe in and encourage sharing. The holy grail is within you, we can help you find it.
  • We expect our members to participate and become a part of the community. Help yourself by helping others.

You'll need to register in order to view the content of the threads and start contributing to our community.  It's free and simple.

-- Big Mike, Site Administrator

Reply
 
Thread Tools Search this Thread
 

U.S. disrupts major hacking, extortion ring; Russian charged

  #1 (permalink)
Elite Member
Aurora, Il USA
 
Futures Experience: Advanced
Platform: TradeStation
Favorite Futures: futures
 
kbit's Avatar
 
Posts: 5,872 since Nov 2010
Thanks: 3,301 given, 3,332 received

U.S. disrupts major hacking, extortion ring; Russian charged

A U.S.-led international operation disrupted a crime ring that infected hundreds of thousands of PCs around the globe with malicious software used for stealing banking credentials and extorting computer owners, the Justice Department said on Monday.

Authorities in nearly a dozen countries worked with private security companies to wrest control of the network of infected machines, known by the name of its master software, Gameover Zeus.

Court documents released on Monday said that between 500,000 and 1 million machines worldwide were infected with the malicious software, which was derived from the original "Zeus" trojan for stealing financial passwords that emerged in 2006.

In addition to stealing from the online accounts of businesses and consumers, the Gameover Zeus crew installed other malicious programs, including one called Cryptolocker that encrypted files and demanded payments for their release. Cryptolocker alone infected more than 234,000 machines and won $27 million in ransom payments, the Justice Department said.

The two programs together brought the gang more than $100 million, prosecutors said in court documents, including $198,000 in an unauthorized wire transfer from an unnamed Pennsylvania materials company and $750 in ransom from a police department in Massachusetts that had its investigative files encrypted. Other victims included PNC Bank [], Capital One Bank [COFCB.UL] and others, according to court documents.

“These schemes were highly sophisticated and immensely lucrative, and the cyber criminals did not make them easy to reach or disrupt,” Leslie Caldwell, who heads the Justice Department's criminal division, told a news conference.

The Gameover Zeus "botnet" - short for robot network - is the largest so far disrupted that relied on a peer-to-peer distribution method, where thousands of computers could reinfect and update each other, said Dell expert Brett Stone-Gross, who assisted the FBI.

"We took control of the bots, so they would only talk with our infrastructure," Stone-Gross said.

A civil suit in Pennsylvania helped authorities get court orders to seize parts of the infected network, and on May 7, Ukrainian authorities seized and copied Gameover Zeus command servers in Kiev and Donetsk, officials said. U.S. and other agents worked from early Friday through the weekend to seize servers around the world, freeing some 300,000 victim computers from the botnet so far.

A criminal complaint unsealed today in Nebraska, meanwhile, accused Russian Evgeniy Mikhaylovich Bogachev and others of participating in the conspiracy.

U.S. officials said Bogachev was last known to be living in the Black Sea resort town of Anapa. In an FBI affidavit filed in the Nebraska case, an agent cited online chats in which aliases associated with Bogachev claimed authorship of the original Zeus trojan, which has infected more than 13 million computers and is blamed for hundreds of millions of dollars in losses.

"That's what he claimed. There were probably a number of people involved," said Dmitri Alperovitch, co-founder of security firm CrowdStrike, which also worked with the FBI. A person familiar with the case said that Bogachev's ICQ number, which is an assigned Internet chat query identifier, matched that of the known Zeus author. Attempts to reach Bogachev were unsuccessful. FBI and Justice Department officials did not immediately respond to questions about Bogachev's alleged past role with Zeus, one of the most pernicious pieces of software ever developed. Zeus's code has since been publicly released, and many variants are still being used by gangs large and small.

"Zeus is probably the most prolific and effective piece of malware discovered since 2006," said Lance James, head of cyber-intelligence at consultancy Deloitte & Touche, which also helped authorities.

Russia does not extradite accused criminals to other countries, so Bogachev may never be arrested. He was named as part of a new policy on aggressively exposing even those the United States has little hope of catching. The recent crackdown includes the indictment of five members of China's People's Liberation Army for alleged economic espionage, which prompted denials and an angry response from Chinese authorities.

“This is the new normal,” Robert Anderson, the top FBI official in charge of combating cyber crime said at a news conference announcing the Russian action.

When asked whether Russian authorities would turn Bogachev over to the U.S., Deputy Attorney General James Cole said “as far as Russia, we are in contact with them and we’ve been having discussions with them about moving forward and about trying to get custody of Mr. Bogachev,” but declined to provide further detail of those talks. The shutdown of Gameover Zeus may not last. Other botnets have resurfaced as criminals regained at least partial control of their networks. Officials at the United Kingdom's National Crime Agency said in an "urgent warning" that users might have only two weeks to clean their computers from traces of the infection. They directed users to www.getsafeonline.org/nca, which was intermittently available late Monday.

The U.S. Department of Homeland Security set up a website to help victims remove the malware, GameOver Zeus P2P Malware | US-CERT. The European Cybercrime Centre also participated in the operation, along with Australia, Canada, France, Germany, Italy, Japan, Luxembourg, New Zealand, Ukraine.

Intel Corp, Microsoft Corp, security software companies F-Secure, Symantec Corp, and Trend Micro; and Carnegie Mellon University supported the operation.

U.S. disrupts major hacking, extortion ring; Russian charged | Reuters

Reply With Quote

Reply



futures io > > > > U.S. disrupts major hacking, extortion ring; Russian charged

Thread Tools Search this Thread
Search this Thread:

Advanced Search



Upcoming Webinars and Events (4:30PM ET unless noted)

Linda Bradford Raschke: Reading The Tape

Elite only

Adam Grimes: TBA

Elite only

NinjaTrader: TBA

January

Ran Aroussi: TBA

Elite only
     

Similar Threads
Thread Thread Starter Forum Replies Last Post
Fraud Ring In Hacking Attack On 60 Banks kbit News and Current Events 0 June 27th, 2012 12:57 PM
Strauss Kahn too prostitution ring GridKing News and Current Events 0 March 29th, 2012 09:10 AM
Greece's Extortion Racket Jumps To The Next Level Quick Summary News and Current Events 0 November 4th, 2011 11:05 PM
BP Unveils Major Share Swap With Russian Oil Giant Rosneft Quick Summary News and Current Events 0 January 14th, 2011 08:50 PM
Shark Hacking websouth The Elite Circle 28 March 13th, 2010 12:24 PM


All times are GMT -4. The time now is 03:16 PM.

Copyright © 2017 by futures io, s.a., Av Ricardo J. Alfaro, Century Tower, Panama, +507 833-9432, info@futures.io
All information is for educational use only and is not investment advice.
There is a substantial risk of loss in trading commodity futures, stocks, options and foreign exchange products. Past performance is not indicative of future results.
no new posts
Page generated 2017-12-11 in 0.09 seconds with 19 queries on phoenix via your IP 54.226.172.30