FBI assumes control of BotNet ‘Coreflood,’ files civil suit
True to TV shows and Hollywood movies, the FBI commands myriad resources and capabilities — some relatively common, while others are far more exotic. Chalk up its latest internet op as the latter.
The FBI working in concert with the Department of Justice took control of the botnet Coreflood this week according to a press release issued by the DoJ.
Combining a TRO and computer savvy, the pair remotely disabled the malware on computers affected by the botnet’s command and control actions and prevented those behind the illicit activities from updating Coreflood.
“Five C & C servers that remotely controlled hundreds of thousands of infected computers were seized, as were 29 domain names used by the Coreflood botnet to communicate with the C & C servers,” said the DoJ. “As authorized by the TRO, the government replaced the illegal C & C servers with substitute servers to prevent Coreflood from causing further injury to the owners and users of infected computers and other third parties.”
Furthermore, a civil suit (.pdf) was filed by the U.S. Attorney’s Office against an unlucky 13 “John Does” for crimes including the illegal interception of electronics communication, wire fraud and bank fraud.
“Law enforcement will continue to use innovative and responsible actions in our fight against cyber criminals and at the same time, we urge consumers to ensure they are continually taking prudent measures to guard against harm, including routinely updating anti-virus security protection,” said Assistant Attorney General Lanny A. Breuer of the Criminal Division.
Some worry that using the word “responsible” here might be stretching it.
“Do we really want to set a precedent where the FBI can send commands remotely to millions of computers?” asked TechDirt’s Mike Masnick.
Wired.com received a statement from the EFFs Chris Palmer that echoed Masnick’s fears: “Even if we could absolutely be sure that all of the infected Coreflood botnet machines were running the exact code that we reverse-engineered and convinced ourselves that we understood, this would still be an extremely sketchy action to take,” he said.
Palmer’s fear that such operations could have unforeseen consequences is fair, though assumptive. A more concrete concern, however, is that despite the Coreflood shutdown there is no guarantee it’s gone for good.
The FBI declared that innocent users with Coreflood-infected computers will be offered the option to keep the malware active if they so choose, and that no sensitive, private information will be accessed in the process of the investigation.
The last time a BotNet made the news was in March when U.S. authorities and Microsoft collaborated to take down a malicious server group deemed guilty of sending the bulk of worldwide internet spam. The Rustock botnet (RIP) was crippled, and…not much changed, admitted experts.
The botnet may have been decimated and unable to send those annoying messages everyone loathes, but that didn’t stop others from picking up where Rustock had left off.
For all the court documents involving the Coreflood case, click here.
There are 1 comments
- Mary Cahill
- MyCE Rookie
- Posted on: 15 Apr 11 16:28
Most popular headlines
- Wed 16 Apr 05:04 by DoMiN8ToR
An update to the Anti Malware Service for Windows XP is causing systems to slow ...
- Fri 11 Apr 12:04 by Seán Byrne
Like most DVD and Blu-ray titles, content provider websites such as NBC, RT&Eacu...
- Mon 14 Apr 04:04 by Vroom
Review: Crucial M550 Reviewed by: ANTONIS SAPANIDIS Provided by: Cr...
- Mon 14 Apr 05:04 by DoMiN8ToR
Microsoft released two patches already for users who received error codes 800700...
- Tue 15 Apr 07:04 by DoMiN8ToR
DVDFab has posted a clarification on of their disc decryption policy on our foru...