Dutch Police Take Down Hornets' Nest of DDoS Botnets (zdnet.com) 17
Dutch police have taken down this week a bulletproof hosting provider that has sheltered tens of IoT botnets that have been responsible for hundreds of thousands of DDoS attacks around the world, ZDNet reports. From the report: Servers were seized, and two men were arrested yesterday at the offices of KV Solutions BV (KV hereinafter), a so-called bulletproof hosting provider, a term used to describe web hosting providers that ignore abuse reports and allow cybercrime operations to operate on their servers. For two years, the company has provided hosting infrastructure to internet criminals, and has been one of the most serious offender at that, hosting all sorts of badies, from phishing pages to vulnerability scanners, and from crypto-mining operations to malware repositories. But above all, the company has made a reputation in cyber-security circles for being a hotspot for DDoS botnets, with cyber-criminals renting KV servers to host their bot scanners, malware, and command-and-control (C&C) servers, knowing they'd be safe from "harm."
Good news everyone!! (Score:2)
Now lets hope it takes a while fro someone to replace them.
So now what? (Score:2)
It'll just move to another willing provider or providers who look the other way, just give it time.
How Many Years To Arrest? (Score:2)
Re: (Score:2)
Police in place, criminals who got offered a police deal years ago.
Just like the USA but the EU nations use the media better to push the "cyber" story that took time.
Then tell the world the lax use of "computers" allowed the cybercrime to be detected.
Tax the police have real computer skills too.
Good cyber gets more of a computer police budget next year too.
It gives time for the informant and undercover police to move on with their "unde
Re: (Score:3)
EU police like to watch and learn along with their way informants.
Police in place, criminals who got offered a police deal years ago.
Just like the USA but the EU nations use the media better to push the "cyber" story that took time.
Then tell the world the lax use of "computers" allowed the cybercrime to be detected.
Tax the police have real computer skills too.
Good cyber gets more of a computer police budget next year too.
It gives time for the informant and undercover police to move on with their "undercover" work to another set of criminals.
Its not an informant its always the "computers". Its the EU nations police way of protecting all their years of informants they always use.
Thats why it takes so long and its always a happy ending about "computers".
See a perfect cyber story? Thats the way the police like it.
Win , win , win.
Win on the budget.
Win on moving proven and now trusted informants around.
Win on the good news story.
Can anyone translate this for me? Google translate came up with nothing.
Re: (Score:2)
Can anyone translate this for me? Google translate came up with nothing.
Not me. Sorry.
Re: (Score:2)
Re: (Score:2)
The problem is skill level, the better they are the far more likely they are to seek high paid private employment, leaving the government short. Contracting out work to private companies does not work, they tender the work with the lowest skill set and cheapest people possible, they lie about their capability and in order to pump out more contracts, they always, lie about the threat, not sometimes, always.
So the government needs to find a way to put highly skilled people on low value contracts on full time
Re:How Many Years To Arrest? (Score:5, Insightful)
They need time to gather evidence that these hosting companies are willfully helping criminals rather than just being uncooperative or negligent. While it is annoying that the hosters could operate for two years (according to TFA), you wouldn't want the police to raid data centers on the first complaint either.
Re: (Score:2)
They need time to gather evidence that these hosting companies are willfully helping criminals rather than just being uncooperative or negligent. While it is annoying that the hosters could operate for two years (according to TFA), you wouldn't want the police to raid data centers on the first complaint either.
Oh nm, maybe this is the translation.
Thank you!
Re: (Score:3)
From experience, nonsense. Victims provide masses of data against specific abusers which law enforcement refuse to do anything about. The FBI Computer Crime Center has become notorious for only ever accepting reports: I cannot find a single criminal arrest or successful prosecution founded in their efforts since their creation. Are you aware of _any_ successful FBI criminal arrests or prosecutions that were based on the tracking and detection of computer crime _by the FBI_?
Re: (Score:3)
While it is annoying that the hosters could operate for two years (according to TFA), you wouldn't want the police to raid data centers on the first complaint either.
I expect there were plenty of complaints. It seems to be a police method to hope that the problem goes away before they need get their arses out of the office chair.
Re: (Score:2)
If I may say, no, they don't. "Going after the big fish" is an old habit of many law enforcement departments. But the refusal to act against the smaller abusers encourages abuse, and encouraged this business to host abuse. A few public raids of easily tracked abuse, simply seizing abusive systems as quickly as they were detected, would have a chilling effect on this company and on their clients. The ideal is to prosecute quickly, and effectively, not to succeed in catching the "kingpins". Once seized, most
See, they said they were harmless (Score:3)
Re: (Score:2)
Wait until they hit the frakkin' toasters!
If you ever come across 'KV' on a Dutch porn site. (Score:2)
... DON'T click it.
Unless you like to see the silly language edition of 2girls1cup.
KV = Kaviar = Caviar. ;)
Named such for obvious similarities in taste, I guess.