Microsoft closes Kelihos botnet case after latest settlement

Share this article:

Andrey Sabelnikov, a Russian software programmer named in January as a defendant in the Kelihos botnet case, has reached a confidential settlement with Microsoft -- a development that effectively closes the case.

Richard Boscovich, assistant general counsel for Microsoft's digital crimes unit, announced the news Friday on the company's TechNet blog, where a joint statement with Sabelnikov said the programmer was “not the operator of the botnet or involved in its activities,” although he did write code for the large network of compromised PCs.

Microsoft shut down the now-defunct Kelihos botnet in September 2011, after finding that the network of approximately 41,000 infected computers was capable, at its peak, of spamming out 3.8 billion emails a day. Allegedly, victims' personal information, like emails and passwords, were stolen and sites promoting the sexual exploitation of children were promoted through the botnet, among other scams, according to Microsoft.

The Kelihos botnet was dismantled on more than one occasion by Microsoft, as its perpetrators continued to resurrect the network by tweaking the malware used in the attacks.

Last October, Microsoft dismissed its case against another defendant, Dominique Piatti, and his company, dotFREE Group SRO, after a settlement was reached.

As a part of the terms of that settlement, Piatti agreed to delete or transfer subdomains connected to the Kelihos botnet, which led to Microsoft uncovering additional evidence that led to action against Sabelnikov.

“Today, I am pleased to say we have reached an agreement with Mr. Sabelnikov, and have officially settled and closed the Kelihos botnet case," Boscovich wrote.


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.