The National  Memo Logo

Smart. Sharp. Funny. Fearless.

Monday, December 09, 2019 {{ new Date().getDay() }}

Washington (AFP) – An international dragnet has dismantled a global computer hacker network which used a sophisticated computer virus to steal millions of dollars from companies and consumers, the U.S. Justice Department announced Monday.

Gameover Zeus, which first appeared in September 2011, stole bank information and other confidential details from victims.

According to FBI investigators, the virus infected between 500,000 and a million computers in 12 countries, creating a network of “bots” the hackers could “infiltrate, spy on, and even control, from anywhere they wished.”

“Gameover Zeus is the most sophisticated botnet the FBI and our allies have ever attempted to disrupt,” said FBI Executive Assistant Director Anderson.

The FBI blamed the Gameover Zeus botnet for the theft of more than $100 million, obtained by using the stolen bank data and then “emptying the victims’ bank accounts and diverting the money to themselves.”

The bust also targeted another computer virus, dubbed “Cryptolocker,” which appeared in September 2013.

The virus encrypted the computers of its victims and demanded a ransom — often in excess of $700 — in exchange for the password to unlock it. Investigators say the cyber criminals amassed more than $27 million in just the first two months.

Russian Evgeniy Mikhailovich Bogachev, 30, an alleged administrator of the network, was charged in Pittsburgh, Pennsylvania, with 14 counts including conspiracy, computer hacking, bank fraud and money laundering in the Gameover Zeus and Cryptoblocker schemes.

Bogachev, sometimes called “Slavik” or “Pollingsoon,” was also charged in Omaha, Nebraska with “conspiracy to commit bank fraud” in relation to an earlier incarnation of Gameover Zeus.

“Evgeniy Bogachev and the members of his criminal network devised and implemented the kind of cyber crimes that you might not believe if you saw them in a science fiction movie,” said Leslie Caldwell, deputy attorney general.

U.S. investigators worked with counterparts in Australia, the Netherlands, Germany, France, Italy, Japan, Luxemburg, New Zealand, Canada, Ukraine, and Britain, as well as the European Cybercrime Center, according to a statement.

They were also aided by private companies, including Dell, Microsoft, Afilias, Deloitte and Symantec.

Victims are urged to contact a site created by the Department of Homeland Security: https://www.us-cert.gov/gameoverzeus

AFP Photo

Start your day with National Memo Newsletter

Know first.

The opinions that matter. Delivered to your inbox every morning

Jeff Danziger lives in New York City. He is represented by CWS Syndicate and the Washington Post Writers Group. He is the recipient of the Herblock Prize and the Thomas Nast (Landau) Prize. He served in the US Army in Vietnam and was awarded the Bronze Star and the Air Medal. He has published eleven books of cartoons and one novel. Visit him at DanzigerCartoons.

Jason Miller

Screenshot from C-SPAN

Reprinted with permission from Daily Kos

If there's anything that right-wing chat platforms promising uncensored "free speech" like Gab and Parler have proven, it's that such predicates ensure the platforms will quickly be inundated with the worst people in the world—bigots spewing death threats, hatemongers, disinformation artists, conspiracy theorists, vile misogynists, and terrorists of all stripes. The kind of clients that will doom such networks to permanent deplatforming.

Keep reading... Show less
x

Close