Conficker worm
Conficker is a worm who was for the first time detected in November, 2008. He used several vulnerabilities, including one of them - in a network service which can be found in different versions of Windows, such as Windows XP, Windows Vista and Windows 2000. In process of distribution of Conficker used the infected computers for creation botnet. By estimates, it infected from 9 to 15 million computers. Despite rather wide circulation, Conficker did not cause extensive damage.
2011: The Ukrainian SSU announces the participation in detention of cybercriminals. At the same time this security service investigates leak of classified documents from the division
The Ukrainian security service (SSU) said on Thursday that it helped FBI of the USA and other law-enforcement organizations to terminate gang of kiberprestupnok which activities for distribution of the Conficker worm managed to the banking sector more than in $72 million Quickly extending worm was let out in 2008.
The SSU stated that it polled 16 people concerning whom there is the international investigation on the facts of implementation counterfeit anti-virus programs and bank online fraud.
According to the press release of the SSU, respondents showed that they allegedly used the Conficker worm for distribution of antivirus software, with its help they got access to cash cards. The attacks were carried out, generally against citizens of the USA and Europe. On Tuesday in Ukraine nineteen detentions were carried out, the SSU reported.
16 members of criminal grouping were identified by the SSU, including organizers and assistants. They lived in Kiev, Luhansk and Kharkiv. As a result of 30 searches, 19 of which are carried out in Ukraine, in Latvia more than 30 servers are withdrawn and groupings two members are delayed. According to the competent staff of the SSU, in houses and offices of suspects more than 70 computers, about 300 information media, documents, money are withdrawn. In Latvia two persons are arrested: Peteris Sahurovs 22 years and Marina Maslobojeva 23 years. In the USA they are accused of telephone and computer fraud.
The Conficker worm also known as "Downandup", was one of the most serious problems for the systems of a computer security in recent years. It used vulnerability in the software of Microsoft, having infected not less than 3 million computers and, perhaps, more, than 12 million, during creation of a huge botnet.
It created so serious problem that at the end of 2008 a number of the companies and organizations created the working group Conficker Working Group for a research of the malware and search of methods of its blocking. In February, 2009 Microsoft offered $250 thousand as an award for information which will allow to take to court the person or people who created Conficker.
On Wednesday told FBI that worked together with law enforcement agencies of Great Britain, the Netherlands, Latvia, Germany, France, Lithuania and Sweden, for detention of two Latvian criminal communities.
These groups allegedly made tens of millions of dollars on counterfeit warnings of presence of a virus in computers of the victims, and then received more than for $100 for the software which fixed problems.
One of the Latvian criminal groups infected with 960 thousand computers that it cost users $72 million, this digit on Thursday was specified also by the Ukrainian authorities.
Meanwhile, in the SSU of Ukraine the scandal connected with leakage of confidential data from a subsoil of intelligence agency burst recently. According to the preliminary version, it resulted from actions of the insider. According to the Ukrainian edition, leak came from department "To" the SSU in the Kharkiv region. This department specializes in fight against computer crimes.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls