. Space Industry and Business News .




.
CYBER WARS
Hacker 'command' servers seized in US: Microsoft
by Staff Writers
San Francisco (AFP) March 26, 2012


Microsoft on Monday said that cyber crime "command" servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen.

The software colossus capitalized on laws crafted to fight organized crime groups to obtain court orders to seize servers in Pennsylvania and Illinois being used to control computers corrupted by malicious code.

Viruses slipped into people's computers stole online bank account and password information and relayed it to crooks who have looted more than $100 million in the past five years, according to court documents.

The "worldwide, illegal" computer networks were an amalgam of more than 13 million infected machines referred to as "Zeus botnets" due to the type of malicious code involved.

Zeus malware is designed to log keystrokes typed on computers, watching for patterns that indicate information about online bank accounts.

"A number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization," Microsoft digital crimes unit senior attorney Richard Boscovich said in a blog post.

The seizure of "command and control" servers by Microsoft employees escorted by police on Friday was the latest move by the industry to cut elusive cyber criminals off from infected computers used to do their bidding.

Microsoft six months ago took down a "botnet" believed to have been used for nefarious activities including spam, stock scams, and sexual exploitation of children, and sued the owner of an online domain used to control operations.

The disrupted "Kelihos" network was an apparent reincarnation of the first botnet Microsoft took down with a combination of legal and technical tactics.

A year ago, Microsoft dismantled a "notorious and complex" network of virus-infected computers used to send billions of email messages daily hawking fake drugs.

That Rustock "botnet" consisted of about a million computers that were infected with malicious code to let hackers covertly control the machines from afar using "command and control" servers.

Owners of infected computers are typically not aware that hackers are using their devices.

Cutting hackers off from online servers that act as intermediaries, collecting data from and giving orders to armies of infected "zombie" computers, is a creative new tactic in the war on cyber crime.

The raids on office buildings in Pennsylvania and Illinois on Friday involved federal court warrants obtained under different laws, including a racketeering act designed to fight the Mafia.

Microsoft has teamed up with industry allies and law enforcement agencies to destroy spam or crime spewing botnets to defend the reputation and reliability of the software on which the US technology company's fortune is based.

"Microsoft has invested substantial resources in developing high quality products and services," the company said in court documents.

"Microsoft has generated substantial goodwill with its customers, establishing a strong brand and developing the Microsoft name and the names of its products and services into strong and famous world-wide symbols."

Microsoft resorted to US civil courts to get legal backing to take out the two major botnets last year in a strategy implemented by Boscovich, a former federal prosecutor.

The tactic has been compared to those used by neighborhood watch groups -- ordinary citizens who alert police to suspicious activities.

Hackers cut off from armies of infected computers can regroup and marshal new forces, or adapt viruses to frequently switch command servers or connect, peer-to-peer style, through other tainted machines.

"Identifying command-and-control servers has really come of age in the past year as something that is getting wide attention, especially in the realm of persistent threats," said McAfee Labs senior research analyst Adam Wosotowsky.

"While this surely doesn't put an end to phishing or Zeus-based infections, it should deal a strong blow to botmasters who monetize their infections through thievery," he said.

However, the stepped up US raids could lead hackers to simply relocate to other countries, he added.

"In the struggle between botnets and the security community this is equivalent to a handful of cruise missiles pounding an enemy base," he said.

"It's not the end of the war, but it is a definite statement that our knowledge of the threats has improved to the point where we can target the enemy strongholds."

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
China bloggers skirt censors with noodles, Teletubbies
Beijing (AFP) March 23, 2012
Chinese web users frustrated by the blocking of sensitive terms have come up with a system of bizarre code words to allow them to post on a political saga that has gripped the blogosphere. China blocks all information deemed sensitive under a vast censorship system known as the "Great Firewall", but the huge rise of weibos - microblogs similar to Twitter - is making this task increasingly ... read more


CYBER WARS
Russia to Focus on Its Orbital Cluster - Popovkin

Materials inspired by Mother Nature: A 1-pound boat that could float 1,000 pounds

Soviet Weather Satellite to Fall to Earth

Boeing Receives Phased Array Antenna System Contract from Yahsat

CYBER WARS
Raytheon to Continue Supporting Coalition Forces' Information-Sharing Computer Network

Northrop Grumman Wins Contract for USAF Command and Control Modernization Program

TacSat-4 Enables Polar Region SatCom Experiment

'See Me' satellites may help ground forces

CYBER WARS
ILS Proton Launches Intelsat 22

US ramping up private sector's role in spaceflight

Europe's smart supply ship on its way to Space Station

Third Ariane 5 ready for launch in 2012

CYBER WARS
GIS Technology Offers New Predictive Analysis to Business

Navigation devices in market woes

Iris: watch how satcoms help pilots

Smartphones can help track diseases

CYBER WARS
Asia gets new budget airline eyeing Chinese flyers

South Africa, Singapore airlines fined for price-fixing

Cessna signs agreements with Chinese manufacturer

Aviation driving growth in Latin America

CYBER WARS
Solitary waves induce waveguide that can split light beams

Designer lights from the physics lab

Inner workings of magnets may lead to faster computers

Silicon-carbon electrodes snap, swell, don't pop

CYBER WARS
Spotting ancient sites, from space

Google opens Amazon wilds to armchair explorers

Satellite images identify early human settlements

Investigation of Earth Catastrophes From the ISS: Uragan Program

CYBER WARS
Oil from Deepwater Horizon disaster entered food chain in the Gulf of Mexico

Study shows air emissions near fracking sites may impact health

Researchers describe method for cleaning up nuclear waste

UNH research adds to mounting evidence against popular pavement sealcoat


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement