Operation Ghost Click International Cyber Ring That Infected Millions of Computers Dismantled

http://www.fbi.gov/news/stories/2011/november/malware_110911

 

Learn about DNSChanger malware and how it can affect your computer
Check your computer’s DNS settings


Operation Ghost Click
International Cyber Ring That Infected Millions of Computers Dismantled

11/09/11

Six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses.

Details of the two-year FBI investigation called Operation Ghost Click were announced today in New York when a federal indictment was unsealed. Officials also described their efforts to make sure infected users’ Internet access would not be disrupted as a result of the operation.

FBI Statement:
Janice Fedarcyk, New York
Assistant Director in Charge

“Today, with the flip of a switch, the FBI and our partners dismantled the Rove criminal enterprise. Thanks to the collective effort across the U.S. and in Estonia, six leaders of the criminal enterprise have been arrested and numerous servers operated by the criminal organization have been disabled. Additionally, thanks to a coordinated effort of trusted industry partners, a mitigation plan commenced today, beginning with the replacement of rogue DNS servers with clean DNS servers to keep millions online, while providing ISPs the opportunity to coordinate user remediation efforts.” More


The indictment, said Janice Fedarcyk, assistant director in charge of our New York office, “describes an intricate international conspiracy conceived and carried out by sophisticated criminals.” She added, “The harm inflicted by the defendants was not merely a matter of reaping illegitimate income.”

Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA. The thieves were able to manipulate Internet advertising to generate at least $14 million in illicit fees. In some cases, the malware had the additional effect of preventing users’ anti-virus software and operating systems from updating, thereby exposing infected machines to even more malicious software.

“They were organized and operating as a traditional business but profiting illegally as the result of the malware,” said one of our cyber agents who worked the case. “There was a level of complexity here that we haven’t seen before.”

DNS—Domain Name System—is a critical Internet service that converts user-friendly domain names, such as www.fbi.gov, into numerical addresses that allow computers to talk to each other. Without DNS and the DNS servers operated by Internet service providers, computer users would not be able to browse websites or send e-mail.

Success Through Partnerships

A complex international investigation such as Operation Ghost Click could only have been successful through the strong working relationships between law enforcement, private industry, and our international partners.

Announcing today’s arrests, Preet Bharara, (above left) U.S. Attorney for the Southern District of New York, praised the investigative work of the FBI, NASA’s Office of Inspector General (OIG), the Estonian Police and Border Guard Board, and he specially thanked the National High Tech Crime Unit of the Dutch National Police Agency. In addition, the FBI and NASA-OIG received assistance from multiple domestic and international private sector partners, including Georgia Tech University, Internet Systems Consortium, Mandiant, National Cyber-Forensics and Training Alliance, Neustar, Spamhaus, Team Cymru, Trend Micro, University of Alabama at Birmingham, and members of an ad hoc group of subject matter experts known as the DNS Changer Working Group (DCWG).


DNSChanger was used to redirect unsuspecting users to rogue servers controlled by the cyber thieves, allowing them to manipulate users’ web activity. When users of infected computers clicked on the link for the official website of iTunes, for example, they were instead taken to a website for a business unaffiliated with Apple Inc. that purported to sell Apple software. Not only did the cyber thieves make money from these schemes, they deprived legitimate website operators and advertisers of substantial revenue.

The six cyber criminals were taken into custody yesterday in Estonia by local authorities, and the U.S. will seek to extradite them. In conjunction with the arrests, U.S. authorities seized computers and rogue DNS servers at various locations. As part of a federal court order, the rogue DNS servers have been replaced with legitimate servers in the hopes that users who were infected will not have their Internet access disrupted.

It is important to note that the replacement servers will not remove the DNSChanger malware—or other viruses it may have facilitated—from infected computers. Users who believe their computers may be infected should contact a computer professional. They can also find additional information in the links on this page, including how to register as a victim of the DNSChanger malware. And the FBI’s Office for Victim Assistance will provide case updates periodically at 877-236-8947.

Resources:
- Press release
- Statement by New York ADIC Janice Fedarcyk
- Learn more about DNSChanger malware and how it can affect your computer
- Check your computer’s DNS settings
- Register as a victim of the DNSChanger malware
- Cyber Crimes storiesRegister as a victim of the DNSChanger malware

Update on March 12, 2012: To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time.





Views: 72

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Doc Vega's blog post Why Was The TV Show “The Outer Limits” Such a Threat?
"Gordon thanks for your support."
4 hours ago
Doc Vega posted a blog post

What If origins on Our Planet are Different Than we Think?

 For a long time now there has been a theory that would fit into both creationism and the simulated…See More
4 hours ago
honeygirl posted a video

All Bases Erased, Air Defense Shattered ! Iranian Missiles Massacre U.S. FORCES | Douglas Macgregor

Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
4 hours ago
Less Prone favorited Sandy's video
17 hours ago
Less Prone favorited Doc Vega's blog post The Escape
18 hours ago
Less Prone posted a photo

Same Package - Different Label

This way or that way, we get to the same place. It's time to take another road.
18 hours ago
Less Prone favorited Sandy's video
18 hours ago
agen Dadu is now a member of 12160 Social Network
18 hours ago
Less Prone commented on tjdavis's photo
Thumbnail

TRIVIA OF THE DAY Kier means “Penis” in Persian

"Nomen est omen. A political dick destroying his own country."
18 hours ago
tjdavis's blog post was featured
18 hours ago
Doc Vega's 2 blog posts were featured
18 hours ago
tjdavis favorited honeygirl's video
22 hours ago
Doc Vega posted blog posts
yesterday
Doc Vega commented on cheeki kea's blog post IN ITS OWN WORDS: CHAT GPT LAYS OUT THE AGENDA.
"Wow! The final progressive steps to the government run matrix. Now just fine tuning it. I…"
yesterday
cheeki kea commented on Doc Vega's blog post The Escape
"That's a great poem it's a good time for writing being national poetry month in America…"
yesterday
cheeki kea favorited honeygirl's video
yesterday
cheeki kea commented on cheeki kea's blog post The Decades of Evidence SSRI Antidepressants Cause Mass Shootings
"All good points guys and perhaps in the future we'll see some new freak show of mRNA vax that…"
yesterday
cheeki kea posted a blog post
yesterday
Doc Vega commented on cheeki kea's blog post The Decades of Evidence SSRI Antidepressants Cause Mass Shootings
"SSRI's are poor substute for counciling soldiers back from war suffering from PTSD! "
Tuesday
Doc Vega favorited cheeki kea's blog post The Decades of Evidence SSRI Antidepressants Cause Mass Shootings
Tuesday

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted