• Follow us on Twitter @buckeyeplanet and @bp_recruiting, like us on Facebook! Enjoy a post or article, recommend it to others! BP is only as strong as its community, and we only promote by word of mouth, so share away!
  • Consider registering! Fewer and higher quality ads, no emails you don't want, access to all the forums, download game torrents, private messages, polls, Sportsbook, etc. Even if you just want to lurk, there are a lot of good reasons to register!

Botnet: Theft, Security, Law Enforcement

muffler dragon

Bien. Bien chiludo.
I don't know if this thread will have any legs by itself; therefore, I request that our resident Elitist Pricks move to the proper place if they deem it necessary.

http://www.bloomberg.com/news/2011-06-30/fbi-probes-botnet-infecting-millions-of-computers.html

International law enforcement agencies are investigating what may be the largest documented botnet, a network of tens of millions of hijacked computers used to steal banking information, according to a security firm aiding the investigation.
The botnet, called Metulji, Slovenian for butterfly, is linked to the theft of hundreds of thousands of dollars by a criminal gang based in Eastern Europe, including two people arrested last month in a joint operation in which the FBI joined in, said Karim Hijazi, chief executive officer of Wilmington, Delaware-based Unveillance LLC.
Jenny Shearer, a spokeswoman for the Federal Bureau of Invesetigation, wasn?t immediately available for comment.
The Metulji botnet is at least twice as extensive as any known predecessor and uses a potent new form of spyware that has infected computers in 172 countries, evading anti-virus software, Hijazi said.
Botnets, which are based on computer worms that give criminals remote command of the computers they infect, have helped fuel an expanding crime wave that cyber-security company McAfee Inc. estimates costs $1 trillion a year.
?It?s a live botnet that is probably stealing information and facilitating ill-gotten gains to bad guys right now,? Hijazi, 35.
He said some members of the gang have been traced to the city of Banja Luka in Bosnia and Herzegovina.
cont.
 
http://www.forbes.com/sites/andygre...o-crack-your-pc-and-get-paid-six-figure-fees/

Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)

This story appears in the April 9th issue of Forbes magazine.
At a Google-run competition in ­Vancouver last month, the search giant?s famously secure Chrome Web browser fell to hackers twice. Both of the new methods used a rigged ­website to bypass Chrome?s security protections and completely hijack a target computer. But while those two hacks defeated the company?s defenses, it was only a third one that actually managed to get under Google?s skin.
A team of hackers from French security firm Vupen were playing by different rules. They declined to enter Google?s contest and instead dismantled Chrome?s security to win an HP-sponsored hackathon at the same conference. And while Google paid a $60,000 award to each of the two hackers who won its event on the condition that they tell Google every detail of their attacks and help the company fix the vulnerabilities they had used, Vupen?s chief executive and lead hacker, Chaouki Bekrar, says his company never had any intention of telling Google its secret techniques?certainly not for $60,000 in chump change.
?We wouldn?t share this with Google for even $1 million,? says Bekrar. ?We don?t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.?
Those customers, after all, don?t aim to fix Google?s security bugs or those of any other commercial software vendor. They?re government agencies who &shy:wink2:urchase such ?zero-day? exploits, or hacking techniques that use undisclosed flaws in software, with the ­explicit ­intention of invading or disrupting the computers and phones of crime suspects and intelligence targets.
In that shady but legal market for security vulnerabilities, a zero-day exploit that might earn a hacker $2,000 or $3,000 from a software firm could earn 10 or even 100 times that sum from the spies and cops who aim to use it in secret. Bekrar won?t detail Vupen?s exact pricing, but analysts at Frost & Sullivan, which named Vupen the 2011 Entrepreneurial Company of the Year in vulnerability research, say that Vupen?s clients pay around $100,000 annually for a subscription plan, which gives them the privilege of shopping for Vupen?s techniques. Those intrusion methods ­include ­attacks on software such as Micro­soft Word, Adobe Reader, Google?s ­Android, Apple?s iOS operating systems and many more?Vupen bragged at HP?s hacking competition that it had exploits ready for every major browser. And sources familiar with the company?s business say that a single technique from its catalog often costs far more than its six-figure subscription fee.
Even at those prices, Vupen doesn?t sell its exploits exclusively. ­Instead, it hawks each trick to multiple government agencies, a business model that often plays its customers against one another as they try to keep up in an espionage arms race.
Bekrar claims that it carefully screens its clients, selling only to NATO governments and ?NATO partners.? He says Vupen has further ?internal processes? to filter out nondemocratic nations and requires buyers to sign contracts that they won?t reveal or resell their exploits. But even so, he admits that the company?s digital attack methods could still fall into the wrong hands. ?We do the best we can to ensure it won?t go outside that agency,? Bekrar says. ?But if you sell weapons to someone, there?s no way to ensure that they won?t sell to another agency.?
That arms-trade comparison is one Vupen?s critics are eager to echo. Chris Soghoian, a privacy activist and fellow at the Open Society Foundations, calls Vupen a ?modern-day merchant of death,? selling ?the bullets for cyberwar.? After one of its exploits is sold, Soghoian says, ?it disappears down a black hole, and they have no idea how it?s being used, with or without a warrant, or whether it?s violating human rights.? The problem was starkly illustrated last year when surveillance gear from Blue Coat Systems of Sunnyvale, Calif. was sold to a United Arab Emirates firm but eventually ended up tracking political dissidents in Syria. ?Vupen doesn?t know how their exploits are used, and they probably don?t want to know. As long as the check clears.?
Vupen is hardly alone in the exploit-selling game, but other firms that buy and sell hacking techniques, including Netragard, Endgame and larger contractors like Northrop Grumman and Raytheon, are far more tight-lipped than Bekrar?s small firm in Montpellier, France. Bekrar describes his company as ?transparent.? Soghoian calls it ?shameless.?
?Vupen is the Snooki of this industry,? says Soghoian. ?They seek out publicity, and they don?t even realize that they lack all class. They?re the Jersey Shore of the exploit trade.?
cont.
 
Upvote 0
Back
Top