Current:Home > MyFBI and European partners seize major malware network in blow to global cybercrime -EverVision Finance
FBI and European partners seize major malware network in blow to global cybercrime
Ethermac View
Date:2025-04-07 14:20:17
LOS ANGELES (AP) — U.S. officials said Tuesday that the FBI and its European partners infiltrated and seized control of a major global malware network used for more than 15 years to commit a gamut of online crimes including crippling ransomware attacks.
They then remotely removed the malicious software agent — known as Qakbot — from thousands of infected computers.
Cybersecurity experts said they were impressed by the deft dismantling of the network but cautioned that any setback to cybercrime would likely be temporary.
“Nearly ever sector of the economy has been victimized by Qakbot,” Martin Estrada, the U.S. attorney in Los Angeles, said Tuesday in announcing the takedown. He said the criminal network had facilitated about 40 ransomware attacks alone over 18 months that investigators said netted Qakbot administrators about $58 million.
Qakbot’s ransomware victims included an Illinois-based engineering firm, financial services organizations in Alabama and Kansas, along with a Maryland defense manufacturer and a Southern California food distribution company, Estrada said.
Officials said $8.6 million in cybercurrency was seized or frozen but no arrests were announced.
Estrada said the investigation is ongoing. He would not say where administrators of the malware, which marshaled infected machines into a botnet of zombie computers, were located. Cybersecurity researchers say they are believed to be in Russia and/or other former Soviet states.
Officials estimated the so-called malware loader, a digital Swiss knife for cybercrooks also known as Pinkslipbot and Qbot, was leveraged to cause hundreds of millions of dollars in damage since first appearing in 2008 as an information-stealing bank trojan. They said millions of people in nearly every country in the world have been affected.
Typically delivered via phishing email infections, Qakbot gave criminal hackers initial access to violated computers. They could then deploy additional payloads including ransomware, steal sensitive information or gather intelligence on victims to facilitate financial fraud and crimes such as tech support and romance scams.
The Qakbot network was “literally feeding the global cybercrime supply chain,” said Donald Alway, assistant director in charge of the FBI’s Los Angeles office, calling it “one of the most devastating cybercriminal tools in history.” The most commonly detected malware in the first half of 2023, Qakbot impacted one in 10 corporate networks and accounted for about 30% of attacks globally, a pair of cybersecurity firms found. Such “initial access” tools allow extortionist ransomware gangs to skip the initial step of penetrating computer networks, making them major facilitators for the far-flung, mostly Russian-speaking criminals who have wreaked havoc by stealing data and disrupting schools, hospitals, local governments and businesses worldwide.
Beginning Friday in an operation officials dubbed “Duck Hunt,” the FBI along with Europol and law enforcement and justice partners in France, the United Kingdom, Germany, the Netherlands, Romania and Latvia seized more than 50 Qakbot servers and identified more than 700,000 infected computers, more than 200,000 of them in the U.S. — effectively cutting off criminals from their quarry.
The FBI then used the seized Qakbot infrastructure to remotely dispatch updates that deleted the malware from thousands of infected computers. A senior FBI official, briefing reporters on condition he not be further identified, called that number “fluid” and cautioned that other malware may have remained on machines liberated from Qakbot.
It was the FBI’s biggest success against cybercrooks since it “hacked the hackers” with the January takedown of the prolific Hive ransomware gang.
“It is an impressive takedown. Qakbot was the largest botnet” in number of victims, said Alex Holden, founder of Milwaukee-based Hold Security. But he said it may have been a casualty of its own success in its staggering growth over the past few years. “Large botnets today tend to implode as too many threat actors are mining this data for various types of abuse.”
Cybersecurity expert Chester Wisniewski at Sophos agreed that while there could be a temporary drop in ransomware attacks, the criminals can be expected to either revive infrastructure elsewhere or move to other botnets.
“This will cause a lot of disruption to some gangs in the short term, but it will do nothing from it being rebooted,” he said. “Albeit it takes a long time to recruit 700,000 PCs.”
___
Bajak reported from Boston.
veryGood! (4633)
Related
- SFO's new sensory room helps neurodivergent travelers fight flying jitters
- Oregon newspaper forced to lay off entire staff after discovering that an employee embezzled funds
- Consulting firm McKinsey agrees to $78 million settlement with insurers over opioids
- Japan issues tsunami warnings after aseries of very strong earthquakes in the Sea of Japan
- Nearly 400 USAID contract employees laid off in wake of Trump's 'stop work' order
- College Football Playoff semifinals could set betting records
- UFOs, commercial spaceflight and rogue tomatoes: Recapping 2023's wild year in space
- Consulting firm McKinsey agrees to $78 million settlement with insurers over opioids
- John Galliano out at Maison Margiela, capping year of fashion designer musical chairs
- College Football Playoff semifinals could set betting records
Ranking
- Rams vs. 49ers highlights: LA wins rainy defensive struggle in key divisional game
- Knicks getting OG Anunoby in trade with Raptors for RJ Barrett, Immanuel Quickley
- Your 2024 guide to NYC New Year's Eve ball drop countdown in Times Square
- AP PHOTOS: Dancing with the bears lives on as a unique custom in Romania
- Senate begins final push to expand Social Security benefits for millions of people
- Russia launches record number of drones across Ukraine as Moscow and Kyiv continue aerial attacks
- Unforgettable global photos of 2023: Drone pix, a disappearing island, happiness
- Houthis show no sign of ending ‘reckless’ Red Sea attacks as trade traffic picks up, commander says
Recommendation
Questlove charts 50 years of SNL musical hits (and misses)
Want a polar bear plunge on New Year's Day? Here's a deep dive on cold water dips
Your New Year's Eve TV Guide 2024: How to Watch 'Rockin Eve,' 'Nashville's Big Bash,' more
Surfer dies after shark “encounter” in Hawaii
Why we love Bear Pond Books, a ski town bookstore with a French bulldog 'Staff Pup'
North Korea’s Kim orders military to ‘thoroughly annihilate’ US, South Korea if provoked
Detroit Pistons face final chance to avoid carrying NBA-record losing streak into 2024
Former Ugandan steeplechase Olympian Benjamin Kiplagat found fatally stabbed in Kenya