Police raid botmaster blamed for 1 million infections

Police have raided the NZ home of an alleged botmaster, responsible for the infection of 1 million PCs.

Police have raided the home of the alleged ringleader of an international group of cybercriminals said to be responsible for infecting more than one million computers.

The raid was conducted earlier this week at the New Zealand residence of the alleged botmaster, known online as AKILL. It was part of a joint effort by New Zealand police and the US Federal Bureau of Investigation.

While the FBI believes the raid has helped breakup the botnet network, AKILL has not been arrested, an FBI spokesman said Thursday.

AKILL is an 18-year-old New Zealand man who lives in the province of Waikato, said Detective Inspector Peter Devoy of the New Zealand Police. With the help of an FBI agent on-site in New Zealand, local authorities raided his house on Wednesday. "We've seized his computers and we'll be forensically analyzing them over the next few days," he said.

Botnets are networks of infected computers that can be remotely controlled by criminals to perform a range of illegal activity, such as hosting phishing sites or launching online attacks against victims. Typically the owners of these infected computers don't even realize that their systems are being misused. In the past few years, criminals have become increasingly sophisticated in their use of botnets, making it harder for law enforcement to figure out who exactly is controlling the botnet networks.

AKILL infected PCs using malware known as Akbot, which has been known in the antivirus community for about two years now, Devoy said.

Authorities are unsure of the current size of the AKILL botnet, but it was powerful enough to inadvertently take down a server at the University of Pennsylvania in February 2006. That's when a University of Pennsylvania student named Ryan Brett Goldstein, 21, allegedly conspired with AKILL to launch a 50,000-computer botnet attack against several IRC (Internet Relay Chat) servers and a computer security Web site called ssgroup.org. The botnet was set up to retrieve instructions from a university server, which eventually crashed under the load, according to investigators.

Goldstein's motive was revenge. According to court documents, he wanted to take down IRC discussion forums, in particular one known as TAUNET, which had banned him in early 2006.

AKILL agreed to train his botnet on Goldstein's targets after Goldstein offered AKILL login rights to a Web site and malicious Trojan Horse software, according to Michael Levy, chief of computer crimes with the U.S. Attorney's Office for the Eastern District of Pennsylvania. "Did he pay him? It's in Internet currency: 'Here's some tools for your kit bag,'" he said. "Did he send him money through this Paypal account? No."

During the course of an FBI probe, investigators linked Goldstein to AKILL and began cooperating with New Zealand authorities. U.S. authorities are also investigating two other U.S. residents in connection with the botnet, Levy said.

AKILL, who allegedly is part of an elite botnet group called the A-Team, is also being investigated by the Dutch Independent Post and Telecommunications Authority for his role in an adware scheme thought to have infected 1.3 million computers, New Zealand Police said.

The New Zealand raid was one of several actions undertaken by the FBI since June as part of its "Operation Bot Roast," an effort to crack down on botnets. Since Bot Roast's inception, the FBI has charged or convicted eight men, executed 13 search warrants and uncovered more than US$20 million in economic damages relating to botnets, the agency said in a statement Thursday.

FBI Director Robert Mueller called botnets the "weapon of choice of cyber criminals," in the statement. The FBI said that Internet-related fraud cost US$200 million in 2006.

This is the first time a serious cybercrime investigation has been linked to New Zealand, which has avoided other crime trends because of its geographic isolation. "It's a cultural change for us," said Andrew McAlley, a spokesman with the New Zealand Police. "I think it's going to take time for New Zealanders to come to grips with the ramifications of it."

Jeremy Kirk in London contributed to this story.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?