Categories: SecurityWorkspace

Global Police Disrupt Cryptolocker, Finger Alleged Mastermind

A global police operation has disabled the infrastructure behind the Cryptolocker ransom malware attack, and filed a criminal complaint against the Russian citizen alleged to have been behind it. Users have been told they have two weeks to fix infected machines before the bad guys regain control of the network they have been using.

Police took over large parts of the botnet the GameOver gang was using, redirecting its traffic. In the process, they claim to have uncovered Evgeniy Mikhaylovich Bogachev, accused of being the leader of the gang and the creater of the original Zeus malware – which infects computers and grabs banking details. A specially nasty verion of this, called GameOver Zeus was being used to spread the Cryptolocker code, which hijacked up to one million machines, encrypting their files, and demanding one Bitcoin to restore them.

Cryptolocker gang leader?

Bogachev, also known as “Lucky12345”, “Slavik”, and “Pollingsoon”, wrote the original Zeus  Trojan, police claim, and the gang collected more than $100 million, including ransoms paid by large corporations, banks and even police departments. Bogachev himself lives in the Black Sea town of Anapa.

The gang used a “botnet” of infected machines, which the authorities managed to reprogram so it would not respond to the villains. “We took control of the bots, so they would only talk with our infrastructure,” said Dell expert Brett Stone-Gross, who assisted the FBI, according to Reuters.

The operation involved authorities in Pennsylvania, as well as Ukraine, where police seized and copied command servers belonging to the gang. Over the weekend, police freed around 300,000 victim computers from the botnet. In the process, agents found Bogachev in online chats claiming authorship of the software.

No extradition likely

Although charged with the crime, Bogachev may not face trial, as there is no extradition agreement between the US and Russia. The US Department of Justice named him as part of a new policy, which also saw it expose five Chinese Army members for allegedly spying on US companies.

As criminals work to regain control of their botnets, a press release from the UK National Crime Agency warned users they have two weeks to clean their computers from the infection – although as security expert Graham Cluley pointed out, this may simply confuse people, and the cleanup may be more complex than it sounds.

“Unfortunately, if your computer has been compromised by GameOver Zeus you won’t be able to tell with the naked eye,” said Cluley. “You need good security software to clean-up your infection, and remove affected computers from the internet until they are safe to reconnect.”

Are you a security pro? Try our quiz!

Peter Judge

Peter Judge has been involved with tech B2B publishing in the UK for many years, working at Ziff-Davis, ZDNet, IDG and Reed. His main interests are networking security, mobility and cloud

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago