[TheRecord] Ukraine arrests operator of DDoS botnet with 100,000 bots

Ukrainian law enforcement announced the arrest of a suspect on accusations of running a giant malware botnet of more than 100,000 infected systems.

Authorities said the suspect used their botnet to launch DDoS attacks, send spam, brute-force user account passwords, scan networks for vulnerabilities, and exploit them.

The arrest was announced today by the Security Service of Ukraine (SSU):

The suspect’s name was not released.The arrest took place in the Ivano-Frankivsk region, in the Kolomyia district.SSU officers searched the suspect’s house and seized their computer equipment.SSU said the suspect had advertised their services via Telegram and closed-access forums.The suspect took payment via WebMoney, a Russian money transfer platform banned in Ukraine.

News of the arrest comes after Russian security firm Rostelecom-Solar helped sinkhole the Meris DDoS botnet and after US authorities charged a Turkish national in connection to the WireX botnet.

It is unclear to which malware botnet the suspect arrested in Ukraine is connected. An SSU spokesperson did not return a request for comment.

The post Ukraine arrests operator of DDoS botnet with 100,000 bots appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[HackerNews] Russian Hydra DarkNet Market Made Over $1.3 Billion in 2020

All posts, HackerNews

Russian-language dark web marketplace Hydra has emerged as a hotspot for illicit activities, pulling in a whopping $1.37 billion worth of cryptocurrencies in 2020, up from $9.4 million in 2016. The “blistering growth” in annual transaction volumes marks a staggering 624% year-over-year jump over a three-year period from 2018 to 2020. “Further buoying Hydra’s growth […]

Read More

[ThreatPost] Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate

All posts, ThreatPost

Drivers bristle under constant surveillance by artificial-intelligence (AI) tech, but Amazon says it works and boosts safety. Source: Read More (Threatpost)

Read More

Daily NCSC-FI news followup 2020-04-09

HMR targeted by cyber criminals www.hmrlondon.com/hmr-targeted-by-cyber-criminals On Saturday 14 March 2020, HMR was subjected to a targeted and sophisticated attack by cyber criminals. We took immediate action to stop the attack, but not before the attackers had stolen copies of some of our files.. Were sorry to report that, during 2123 March 2020, the criminals […]

Read More