FBI Dismantles a Malware System That Took Millions in Ransom (bloomberg.com) 19
The FBI said Tuesday that it has taken down a network of hacked devices responsible for extorting tens of millions of dollars from victims around the world. From a report: US officials described the network known as Qakbot as one of the most notorious "botnets" in the world, referring to computer networks that have been infected with malicious software so that they can be controlled remotely without the owner's knowledge -- often to send phishing emails. These emails can in turn be used to hack into victims' computer systems, which attackers will hold for ransom.
Qakbot was instrumental in enabling cyberattacks against businesses and critical services around the world, according to US officials, including hits on the San Bernardino County Sheriff's Department and hospitals run by Prospect Medical Group. The latter resulted in the closure of emergency rooms and medical facilities across the US. US officials estimated that, since its creation in 2008, Qakbot had infected around 200,000 computers in the US and 700,000 globally.
Qakbot was instrumental in enabling cyberattacks against businesses and critical services around the world, according to US officials, including hits on the San Bernardino County Sheriff's Department and hospitals run by Prospect Medical Group. The latter resulted in the closure of emergency rooms and medical facilities across the US. US officials estimated that, since its creation in 2008, Qakbot had infected around 200,000 computers in the US and 700,000 globally.
What about the people behind it? (Score:4, Insightful)
If they remain free, they can just build a new bot net. There are tons of Internet-connected devices out there with security that really sucks, starting with basically every Windows PC. Manufacturers need to do a lot better before this problem gets reduced to acceptable levels. Not that I am in any way opposed to these scum attackers spending some time behind bars and being financially ruined for life. But that is not enough.
Re: (Score:2)
Re: (Score:2)
Kind of hard to put these people behind bars when they're not in your country. They are likely to be in Russia or in other Eastern European countries where Russian speakers are common.
Re: (Score:2)
A) Not necessarily.
B) With an international warrant they would need to be extremely careful while travelling.
My take is the FBI does not actually care and just wanted this press release.
Re: (Score:2)
There's an ICC arrest warrant out now for Putin. Sure he has to be careful traveling, but it's not likely ever to be served.
Re: (Score:2)
Eh, they're using fully patched machines.
The real problem is that Critical Business Systems Shouldn't Be On The Internet, which also isn't feasible, because they require at least indirect access to the internet to receive patches. Then, these management idiots don't want to spend money for everyone to have a work machine, so they implement BYOD policies, so now your idiot horny cow-orker that went purnhob.com.ru and downloaded their age verification application which is required thanks to your state impleme
Re: (Score:2)
A lot of patches are security patches. Which means: If your network is entirely off the internet, most of the patches aren't necessary.
But... as corporate IT is so very often remote, you're back on the internet again, the idiot cow-orker provides a bridge, and life sucks.
Re: (Score:2)
Actually, you don't need to be connected to the Internet to get patches and updates. Businesses need to review security updates and then apply them during their selected maintenance windows. This also means an inventory of each system and managing it as an asset with appropriate security and risk management around it. As an asset, there are tools and mechanisms for managing patches for air-gapped networks. Most of the time it's felt that it's a convenience to have corporate networks attached to the Internet
Re: (Score:2)
Businesses need to review security updates and then apply them during their selected maintenance windows.
LOL
Re: (Score:2)
Suplerative fail most likely (Score:2)