BreachExchange mailing list archives

Monster botnet held 800,000 people's details


From: security curmudgeon <jericho () attrition org>
Date: Thu, 4 Mar 2010 20:17:04 +0000 (UTC)


http://www.theregister.co.uk/2010/03/04/mariposa_police_hunt_more_botherders/

Monster botnet held 800,000 people's details
Fourth zombie admin could be in South America
By John Leyden
Posted in Crime, 4th March 2010 12:33 GMT

The Mariposa botnet had the power to dwarf Georgia and Estonia 
cyberattacks if it had been used to launch denial of service attacks, say 
Spanish police.

Months of investigations by the Guardia Civil in Spain, the FBI and 
security firm Panda Security and Defence Intelligence led to the takedown 
of the 12.7 million strong zombie network in December and the arrest of 
three suspects in Spain two months later.

At a press conference announcing the operation in Madrid on Wednesday, 
Spanish police said they recovered the personal details of 800,000 people 
from systems recovered from three alleged cybercriminals. This cache of 
stolen information includes bank login credentials from businesses and 
consumers as well as email passwords.

Three Spanish residents suspected of running the botnet have been charged 
with online offences: the most senior alleged botmaster, nicknamed 
.Netkairo., 31, from Balmaseda in the spanish province of Vizcaya, as well 
as his two alleged lieutenants JPR, 30, from Molina de Segura Murcia and 
JBR, 25, from Santiago de Compostela in La Corua. None of the suspects 
have been named at this stage of proceedings.

[..]
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/

Get business, compliance, IT and security staff on the same page with
CREDANT Technologies: The Shortcut Guide to Understanding Data Protection
from Four Critical Perspectives. The eBook begins with considerations
important to executives and business leaders.
http://www.credant.com/campaigns/ebook-chpt-one-web.php


Current thread: