FBI assumes control of BotNet ‘Coreflood,’ files civil suit
True to TV shows and Hollywood movies, the FBI commands myriad resources and capabilities — some relatively common, while others are far more exotic. Chalk up its latest internet op as the latter.
The FBI working in concert with the Department of Justice took control of the botnet Coreflood this week according to a press release issued by the DoJ.
Combining a TRO and computer savvy, the pair remotely disabled the malware on computers affected by the botnet’s command and control actions and prevented those behind the illicit activities from updating Coreflood.
“Five C & C servers that remotely controlled hundreds of thousands of infected computers were seized, as were 29 domain names used by the Coreflood botnet to communicate with the C & C servers,” said the DoJ. “As authorized by the TRO, the government replaced the illegal C & C servers with substitute servers to prevent Coreflood from causing further injury to the owners and users of infected computers and other third parties.”
Furthermore, a civil suit (.pdf) was filed by the U.S. Attorney’s Office against an unlucky 13 “John Does” for crimes including the illegal interception of electronics communication, wire fraud and bank fraud.
“Law enforcement will continue to use innovative and responsible actions in our fight against cyber criminals and at the same time, we urge consumers to ensure they are continually taking prudent measures to guard against harm, including routinely updating anti-virus security protection,” said Assistant Attorney General Lanny A. Breuer of the Criminal Division.
Some worry that using the word “responsible” here might be stretching it.
“Do we really want to set a precedent where the FBI can send commands remotely to millions of computers?” asked TechDirt’s Mike Masnick.
Wired.com received a statement from the EFFs Chris Palmer that echoed Masnick’s fears: “Even if we could absolutely be sure that all of the infected Coreflood botnet machines were running the exact code that we reverse-engineered and convinced ourselves that we understood, this would still be an extremely sketchy action to take,” he said.
Palmer’s fear that such operations could have unforeseen consequences is fair, though assumptive. A more concrete concern, however, is that despite the Coreflood shutdown there is no guarantee it’s gone for good.
The FBI declared that innocent users with Coreflood-infected computers will be offered the option to keep the malware active if they so choose, and that no sensitive, private information will be accessed in the process of the investigation.
The last time a BotNet made the news was in March when U.S. authorities and Microsoft collaborated to take down a malicious server group deemed guilty of sending the bulk of worldwide internet spam. The Rustock botnet (RIP) was crippled, and…not much changed, admitted experts.
The botnet may have been decimated and unable to send those annoying messages everyone loathes, but that didn’t stop others from picking up where Rustock had left off.
For all the court documents involving the Coreflood case, click here.
There are 1 comments
- Mary Cahill
- MyCE Rookie
- Posted on: 15 Apr 11 16:28
Most popular headlines
- Fri 7 Mar 12:03 by DoMiN8ToR
The developers of DVDFab today released version 184.108.40.206 of their software which ...
- Wed 5 Mar 04:03 by DoMiN8ToR
DVD-Ranger CineX HD appears to be a working solution against the Cinavia Blu-ray...
- Mon 3 Mar 06:03 by DoMiN8ToR
A report from the Consumer Electronics Association (CEA) reveals that 66% of the...
- Tue 4 Mar 06:03 by DoMiN8ToR
An Android code branch shows surprising and unexpected new build strings like&nb...
- Mon 3 Mar 06:03 by DoMiN8ToR
Seiki today announced the availability of their U-VISION line of 4K up-con...