Editorials       Cover Story   Letters
 Subscribe Now  Contact Us
Search  
 
Book Reviews
Case Study
Constitution of India
Cover Story
Crime File
Cyber Space
Good Living
Harvard Law School
Health & Fitness
Permanent Imprint Leading
   Cases
Know Your Judge
The Law and The Celebrity
Legal Articles
Legal Events
Law for Other Species
Law School Confidential
Legal Scanner
Legal Trotternama
Media Scan
Potpourri
Reasoning The Reasons
Street Lawyer
Study Abroad
Supreme Court Cases
Thinkers & Theory
Top Law Schools
Universal Law of Success
--------------- Print Magazine --------------
 
  May 2016
 
  April 2016
 
 
 
 
CYBER SPACE - By Sanjay Gade
FBI set to kill secret-stealing Russian 'botnet'

The FBI might be asking your permission soon to reach into your computer and rip something out. And you don't know it's there.

In a first for US law enforcement efforts to make the Internet more secure, the Federal Bureau of Investigation has seized control of a Russian cybercrime enterprise that has enslaved millions of personal computers and may have gained access to US diplomatic, military, and law enforcement computer systems.

But to destroy the criminal "botnet" for good, the FBI has to take yet another aggressive step that is alarming privacy rights advocates: remove the malware from the computers in the network.

The FBI's target is a "robot network" dubbed the "Coreflood botnet" by investigators. It is a worldwide network created by a Russian cybercrime gang that took control of 2.3 million personal computers that vacuumed up vast amounts of US personal, financial and government data for almost a decade before being targeted for extermination.

More than a million of the personal computers recruited into the botnet resided in the US, according to a filing by the Department of Justice in federal court in Connecticut. As of three years ago, Coreflood was sucking up about a gigabyte of data per day and as much as 500 gigabytes a year - about equal to five library floors filled with academic journals. But it was not just credit card, wire transfer, and bank passwords - its primary target - that worried the investigators.

At some point, the investigators discovered, Coreflood sent back to Russia "master key" access to computer systems belonging to at least one US embassy in the Middle East - which made government officials more than a little nervous.

This year, the Coreflood botnet had assimilated into the US portion of its network hundreds of thousands of computers belonging to 17 State or local government agencies, including one police department, three airports, and two defence contractors. Add to that list five banks or financial institutions, about 30 colleges or universities, and approximately 20 hospital or health-care companies as well as hundreds of businesses, according to the Justice Department's court filing.

Anonymous and cheap to build, botnets are a nearly ideal criminal platform on the Internet for attacks aimed at shutting down company websites - unless a payment is made - and especially pilfering personal banking credentials.

Sanjay Gade

 
LAWYERS UPDATE
(Print Version)
Rs. 600/- per year
(Registered Post & Courier)
     
 

New Releases by UNIVERSAL's

     To avail discounts and for more details write to us at marketing.in@lexisnexis.com

Home     :      About Us     :      Subscribe     :      Advertise With Us    :       Privacy     :      Copyright     :      Feedback     :      Contact Us

Copyright © Universal Book Traders. All material on this site is subject to copyright. All rights reserved.
No part of this material may be reproduced, transmitted, framed or stored in a retrieval system for public or private
use without the written permission of the publisher. This site is developed and maintained by Universal Legal Infosolutions.
Powered by: Universal Book Traders