Search This Blog

Powered by Blogger.

Blog Archive

Labels

US dismantles giant Kelihos botnet after Russian hacker’s arrest


The U.S. Justice Department said on Monday (April 10) that it launched an effort to take down the giant Kelihos botnet, a global network of tens of thousands of infected computers which it claimed was operated by a 36-year-old Russian national, Peter Yuryevich Levashov who was arrested in Spain over the weekend.

The department said that the network was responsible for sending spam emails, distributing ransomware and malware, harvest usernames and passwords and engage in Bitcoin theft and spamming. The botnet at times grew larger than 100,000 simultaneously infected devices to carry out various spam attacks, including pump-and-dump stock schemes.

Many spam emails were advertising counterfeit drugs, promoting penny stocks and work-at-home scams. Levashov harvested login credentials from infected PCs too. This was done to break into the users’ online bank accounts or to sneak into the victim’s email accounts to send out more spam. He had even helped other cybercriminals distribute malware in exchange for payment, U.S. investigators claim.

It even used peer-to-peer communications to allow each individual node to act as its own command-and-control server and its malicious activity is thought to have affected five percent of all organisations across the globe.

Working alongside the FBI and security company Crowdstrike, the US Department of Justice has started blocking domains associated with the Kelihos botnet, one of the most prolific networks of hacker-controlled computer systems in the world. The Kelihos botnet infected computers running Microsoft Corp's Windows operating system since approximately 2010. Once enslaved, Levashov turned the PC into a mail server without the victim’s knowledge, the U.S. government claimed.

While investigating, the FBI noticed that one of the botnet’s servers was constantly logging into an email account at mail.ru. That account was registered to a “Pete Levashov,” and was also associated with an Apple iCloud account under a similar name, according to an FBI filed court document.
Levashov allegedly used the information gained from this credential-harvesting operation to further his illegal spamming operation which he advertised on various online criminal forums.

Like other botnets, Kelihos is designed to remain undetected on the infected victim's computer, enabling it to secretly receive instructions for malicious activities and send data back to its operators.
DOJ hasn’t revealed the charges against Levashov because the case remains under seal, but offered reporters documents that showed U.S. investigators obtained court orders to stop Levashov from controlling his botnet.

Russian-state media service RT reported Levashov was taken into custody in Spain over the weekend on a U.S. warrant. It was not known if Levashov had an attorney.

In order to liberate victim computers, US authorities obtained court orders from the US District of Alaska, granting them permission to redirect traffic from Kelihos-infected computers onto a substitute server run by the FBI, and record the IP addresses the machines attempt to connect to. 

Three previous versions of Kelihos had been taken down, but each time it was able to grow back with improvements that made it more resilient. In the most recent iterations, individual infected computers could update each other with new code, so that just taking down the few command servers was insufficient.

The FBI estimates the Kelihos botnet has between 25,000 and 100,000 computers currently under its control. About 5 to 10 percent reside in the U.S.

Although the dismantling should be a major blow to Kelihos, the Justice Department hasn't said if others might have been involved in the botnet's activities.

Users can use free antivirus tools such as Microsoft Safety Scanner to clear Kelihos-related malware from their PCs. Internet service providers will also be told which IP addresses have been found supporting the botnet's activities.

Levashov, who has long been considered the likely identity of an online persona known as Peter Severa, spent years listed as among the world's 10 most prolific computer spammers by Spamhaus, a spam-tracking group.



Share it: