Skip to main content

Emotet: Police raids take down botnet that hacked 'millions of computers worldwide

 


Emotet, one of the world’s most dangerous cyber crime services, has been taken down following one of the largest ever internationally-coordinated actions against cyber criminals.

Although it began as banking malware designed to steal financial credentials, Emotet had become an infrastructure tool leased out to cyber criminals to break into victim computer networks and install additional malicious software.

Law enforcement agencies in the UK, North America and Europe had worked for almost two years to map the system’s infrastructure before the National Police of Ukraine raided properties to capture the computers it was being controlled from.

Videos of the raids uploaded by the National Police of Ukraine show the messy environments the computers were being operated from and the range of digital devices, foreign currencies, and even gold bars that were also seized.

The UK’s National Crime Agency (NCA) said the botnet had been used “to infiltrate thousands of companies and millions of computers worldwide”, with Europol — who coordinated the operation alongside Eurojust — described it as “the world’s most dangerous malware”.

Police in the Netherlands, Germany, the US, UK, France, Lithuania, Canada and Ukraine took part in the investigation, with the British NCA leading the financial sleuthing team, tracking “how the criminal network behind the malware was funded, where that funding went, and who was profiteering”.

Although Emotet was first discovered in 2014 as banking malware, it gained a reputation in the cyber crime community as a tool that could be used to open the door for other malwares and ransomware.

“Cyber criminals used Emotet as their first port of call,” said the NCA, explaining how the automated botnet “would send out emails to unsuspecting victims or companies with the malware either embedded in the email as a downloadable link, or included as a word doc attachment.

“When people clicked into the attachments or links, they were prompted to enable content to view the document, but in doing so allowed the malware to install and take hold of their computers.”

Europol said the Emotet infrastructure “involved several hundreds of servers located across the world, all of these having different functionalities in order to manage the computers of the infected victims, to spread to new ones, to serve other criminal groups, and to ultimately make the network more resilient against takedown attempts”.

Law enforcement has taken down the botnet by effectively hijacking it from the inside.

Although they are unable to uninstall the malware from victim’s computers, the infected machines are now being redirected towards infrastructure which the police are controlling — preventing criminals from using them to steal more data or send phishing emails.

The NCA’s analysis identified $10.5m being moved by the Emotet operators over a two-year period on just one virtual currency platform.

They also spotted almost $500,000 had been spent by the group over the same period just to maintain their criminal infrastructure.

Nigel Leary, the deputy director of the NCA’s National Cyber Crime Unit, said: “Emotet was instrumental in some of the worst cyber attacks in recent times.”

He said that it enabled up to 70% of the entire world’s malwares, including many — such as Trickbot and RYUK — which had a “significant economic impact” on businesses in the UK.

None of the police agencies announced arrests for the individuals who operated the infrastructure, although there was a suggestion that those who used it might be identified.

“Working with partners we’ve been able to pinpoint and analyse data linking payment and registration details to criminals who used Emotet,” said Mr Leary.

“This case demonstrates the scale and nature of cyber crime, which facilitates other crimes and can cause huge amounts of damage, both financially and psychologically.

“Using our international reach, the NCA will continue to work with partners to identify and apprehend those responsible for propagating Emotet Malware and profiting from its criminality.”


Originally published at https://news.sky.com.

Comments

Popular posts from this blog

Google can now help you figure out that song stuck in your head - all you have to do is hum (or whistle) into your phone

  Google just launched its “hum to search” feature, which allows users to hum, whistle, or sing for 10–15 seconds in order to identify a song. The feature currently works in 20 languages, and Google hopes to add more. Google has finally launched the perfect feature for when a song is stuck in your head but you don’t know any of the words. “Hum to search” launched today on both the Google app for iOS and Android, according to Google’s blog, The Keyword. Users can also whistle or sing directly into the mic to identify a song. The technology works like this: the user can hum (whistle, or sing) for 10–15 seconds, and then Google’s technology takes the song’s melody and turns it into a numbers-based sequence. From there, the sequence can be used to “identify songs based on a variety of sources, including humans singing, whistling or humming, as well as studio recordings,” according to Google’s announcement. The sequence also strips away any other outside noise, like accompanying instru...

Ransomware's Dangerous New Trick Is Double-Encrypting Your Data

  Ransomware groups have always taken a more-is-more approach . If a victim pays a ransom and then goes back to business as usual-hit them again. Or don’t just encrypt a target’s systems; steal their data first, so you can threaten to leak it if they don’t pay up. The latest escalation? Ransomware hackers who encrypt a victim’s data twice at the same time. Double-encryption attacks have happened before, usually stemming from two separate ransomware gangs compromising the same victim at the same time. But antivirus company Emsisoft says it is aware of dozens of incidents in which the same actor or group intentionally layers two types of ransomware on top of each other. “The groups are constantly trying to work out which strategies are best , which net them the most money for the least amount of effort,” says Emsisoft threat analyst Brett Callow. “So in this approach you have a single actor deploying two types of ransomware. The victim decrypts their data and discovers it’s not act...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...