[TheRecord] Ukraine arrests operator of DDoS botnet with 100,000 bots

Ukrainian law enforcement announced the arrest of a suspect on accusations of running a giant malware botnet of more than 100,000 infected systems.

Authorities said the suspect used their botnet to launch DDoS attacks, send spam, brute-force user account passwords, scan networks for vulnerabilities, and exploit them.

The arrest was announced today by the Security Service of Ukraine (SSU):

The suspect’s name was not released.The arrest took place in the Ivano-Frankivsk region, in the Kolomyia district.SSU officers searched the suspect’s house and seized their computer equipment.SSU said the suspect had advertised their services via Telegram and closed-access forums.The suspect took payment via WebMoney, a Russian money transfer platform banned in Ukraine.

News of the arrest comes after Russian security firm Rostelecom-Solar helped sinkhole the Meris DDoS botnet and after US authorities charged a Turkish national in connection to the WireX botnet.

It is unclear to which malware botnet the suspect arrested in Ukraine is connected. An SSU spokesperson did not return a request for comment.

The post Ukraine arrests operator of DDoS botnet with 100,000 bots appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[SecurityWeek] SaaS Security Startup Wing Emerges From Stealth With $26 Million in Funding

All posts, Security Week

Wing Security, a Tel Aviv, Israel-based SaaS security startup, this week emerged from stealth mode with $26 million in seed and Series A funding. GGV Capital, Harmony Partners, S-Capital, Silicon Valley CISO Investments Group, and various security leaders have invested in the company. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[NCSC-FI News] Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware

As announced today, Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure We used our research into this threat to enrich our protection technologies and ensure this infrastructure could no longer be leveraged by operators to distribute the trojan or activate deployed payloads like […]

Read More