Quantcast

Microsoft seized two U.S. hacker ‘command’ servers

By Agence France-Presse
Monday, March 26, 2012 15:19 EDT
google plus icon
Microsoft on Monday said that cyber crime "command" servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen. (AFP Photo/Justin Sullivan)
 
  • Print Friendly and PDF
  • Email this page

Microsoft on Monday said that cyber crime “command” servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen.

A team headed by the software colossus capitalized on laws crafted to fight organized crime groups to obtain court orders to seize servers in Pennsylvania and Illinois being used to control computers corrupted by malicious code.

Viruses slipped into people’s machines stole online banking account and password information and relayed it to crooks who have looted more than $100 million in the past five years, according to court documents.

The “worldwide, illegal” computer networks were an amalgam of more than 13 million infected machines referred to as “Zeus botnets” due to the type of malicious code involved.

Zeus malware is designed to log keystrokes typed on computers, watching for patterns that indicate information about online bank accounts.

“A number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization,” Microsoft said.

The seizure of “command and control” servers on Friday was the latest move by Microsoft to collaborate with other members of the industry to cut elusive cyber criminals off from infected computers used to do their bidding.

Microsoft six months ago took down a “botnet” believed to have been used for nefarious activities including spam, stock scams, and sexual exploitation of children, and sued the owner of an online domain used to control operations.

That disrupted “Kelihos” network was an apparent reincarnation of the first botnet Microsoft took down with a combination of legal and technical tactics.

A year ago, Microsoft dismantled a “notorious and complex” network of virus-infected computers used to send billions of email messages daily hawking fake drugs.

The Rustock “botnet” consisted of about a million computers that were infected with malicious code to let hackers covertly control the machines from afar using “command and control” servers.

Owners of infected computers are typically not aware that hackers are using their machines.

(Microsoft on Monday said that cyber crime “command” servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen. AFP Photo/Justin Sullivan)

Agence France-Presse
Agence France-Presse
AFP journalists cover wars, conflicts, politics, science, health, the environment, technology, fashion, entertainment, the offbeat, sports and a whole lot more in text, photographs, video, graphics and online.
 
 
 
 
By commenting, you agree to our terms of service
and to abide by our commenting policy.
 
Google+