FBI assumes control of BotNet ‘Coreflood,’ files civil suit

Posted 14 April 2011 19:59 CEST by Justin_Massoud

True to TV shows and Hollywood movies, the FBI commands myriad resources and capabilities — some relatively common, while others are far more exotic. Chalk up its latest internet op as the latter.

The FBI working in concert with the Department of Justice took control of the botnet Coreflood this week according to a press release issued by the DoJ.

Combining a TRO and computer savvy, the pair remotely disabled the malware on computers affected by the botnet’s command and control actions and prevented those behind the illicit activities from updating Coreflood.

“Five C & C servers that remotely controlled hundreds of thousands of infected computers were seized, as were 29 domain names used by the Coreflood botnet to communicate with the C & C servers,” said the DoJ. “As authorized by the TRO, the government replaced the illegal C & C servers with substitute servers to prevent Coreflood from causing further injury to the owners and users of infected computers and other third parties.”

Furthermore, a civil suit (.pdf) was filed by the U.S. Attorney’s Office against an unlucky 13 “John Does” for crimes including the illegal interception of electronics communication, wire fraud and bank fraud.

“Law enforcement will continue to use innovative and responsible actions in our fight against cyber criminals and at the same time, we urge consumers to ensure they are continually taking prudent measures to guard against harm, including routinely updating anti-virus security protection,” said Assistant Attorney General Lanny A. Breuer of the Criminal Division.

Some worry that using the word “responsible” here might be stretching it.

“Do we really want to set a precedent where the FBI can send commands remotely to millions of computers?” asked TechDirt’s Mike Masnick.

Wired.com received a statement from the EFFs Chris Palmer that echoed Masnick’s fears: “Even if we could absolutely be sure that all of the infected Coreflood botnet machines were running the exact code that we reverse-engineered and convinced ourselves that we understood, this would still be an extremely sketchy action to take,” he said.

Palmer’s fear that such operations could have unforeseen consequences is fair, though assumptive. A more concrete concern, however, is that despite the Coreflood shutdown there is no guarantee it’s gone for good.

The FBI declared that innocent users with Coreflood-infected computers will be offered the option to keep the malware active if they so choose, and that no sensitive, private information will be accessed in the process of the investigation.

The last time a BotNet made the news was in March when U.S. authorities and Microsoft collaborated to take down a malicious server group deemed guilty of sending the bulk of worldwide internet spam. The Rustock botnet (RIP) was crippled, and…not much changed, admitted experts.

The botnet may have been decimated and unable to send those annoying messages everyone loathes, but that didn’t stop others from picking up where Rustock had left off.

For all the court documents involving the Coreflood case, click here.

Mary Cahill
MyCE Rookie
Posted on: 15 Apr 11 14:28
Well, now, this is an FBI action that we can all get behind!
0 Agree

Reactions closed

Sorry, you can't comment on this item anymore. It's either too old or comments are disabled for this post.

Myce.com settings

Several settings at Myce.com can be changed, they are stored in cookies, which means they will be reset if you clear Myce.com cookies


Change the background to a plain color or trianglified image (similar to the default image)

No tracking features

At Myce most social media feature are done server side and impose no privacy risk to the visitor when not used. Several features use Javascript with you can turn off here


Switch to the List layout for an index with chronologycally listed news items or Grid layout for a block based layout. To see the change you need to reload the page