DoJ, FBI disable massive Coreflood botnet

Share this article:
The U.S. Department of Justice (DoJ) has filed a civil complaint against 13 "John Doe" defendants as part of an effort to disable a massive fraud operation involving the decade-old Coreflood botnet, the agency announced Wednesday.

In what it called the most “complete and comprehensive” actions ever taken to dismantle an international botnet, the department, in conjunction with the FBI, also seized five command-and-control (C&C) servers used to remotely manage hundreds of thousands of infected computers.

In addition, authorities took control of 29 domain names used by the Coreflood botnet to communicate with these C&C servers, effectively disabling the enormous network of compromised machines, prosecutors said.

According to court documents, Coreflood is a type of malware that records keystrokes and steals usernames, passwords and other personal and financial information. It is used to pilfer funds from compromised bank accounts and to carry out other crimes.

More than two million computers worldwide are believed to be infected with the Coreflood trojan.

“The seizure of the Coreflood servers and internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood for their nefarious purposes,” David Fein, U.S. attorney for Connecticut, said in a statement. 

The defendants referenced in the civil complaint allegedly engaged in wire fraud, bank fraud and illegal interception of electronic communications as part of the scheme.

To disable the botnet and minimize its impact, federal authorities obtained a temporary restraining order to replace the illegal C&C servers with substitute servers, prosecutors said.

The restraining order also authorizes law enforcement to temporarily stop the malware from running on currently infected computers, giving anti-virus makers time to update their signatures and removal tools so the latest version of the trojan permanently can be eradicated from infected computers.

Authorities will work with internet service providers to notify victims that they have the malware running on their machines.

“At no time will law enforcement authorities access any information that may be stored on an infected computer,” the department said.

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.