Feds to remotely uninstall Coreflood bot from some PCs

Post Reply
User avatar
Pigeon
Posts: 18065
Joined: Thu Mar 31, 2011 3:00 pm

Feds to remotely uninstall Coreflood bot from some PCs

Post by Pigeon » Thu Apr 28, 2011 1:20 am

Coreflood made the news earlier this month when the U.S. Department of Justice (DOJ) and FBI obtained an unprecedented temporary restraining order that allowed them to seize command-and-control servers that managed the botnet's estimated 2.3 million compromised PCs.

Now that the Command and Control system has been dealt a big blow, the controlled machines are the next target.

Users must sign consent form before FBI tells malware to delete itself.

Computerworld - Federal authorities will remotely uninstall the Coreflood botnet Trojan from some infected Windows PCs over the next four weeks.

Coreflood will be removed from infected computers only when the owners have been identified by the Department of Justice (DOJ) and they have submitted an authorization form to the FBI.

The DOJ's plan to uninstall Coreflood is the latest step in a coordinated campaign to cripple the botnet, which controls more than 2 million compromised computers.

Two weeks ago, the DOJ and the FBI obtained an unprecedented temporary restraining order that allowed them to seize five command-and-control (C&C) servers that managed Coreflood. Since then, the U.S. Marshal's Service has operated substitute C&C servers that have disabled the bot on most infected PCs.

Those actions have reduced Coreflood by 90% in the U.S. and nearly 75% in other countries, but the government wanted to do more.

"Additional time is needed, however, both to allow more antivirus vendors to release virus signatures for Coreflood and to complete the process of notifying Coreflood victims," the DOJ said in a memorandum filed Saturday.

On Monday, U.S. District Court Judge Vanessa Bryant granted the DOJ's request for a preliminary injunction. It expires May 25.

The FBI has also identified infected computers, and in some cases has linked names to the static IP addresses. Those are the PCs targeted for remote Coreflood eradication.

"While the proposed preliminary injunction is in effect, the Government also expects to uninstall Coreflood from the computers of Identifiable Victims who provide written consent," said the DOJ in the memo.

In that same memo, the DOJ said it was not required to ask permission of Judge Bryant before making its move. "The Government is not requesting explicit authorization from the Court to do so, because the written consent form obviates the need for such authorization," DOJ lawyers said.

The consent form does come with warnings, however.

"While the 'uninstall' command has been tested by the FBI and appears to work, it is nevertheless possible that the execution of the 'uninstall' command may produce unanticipated consequences, including damage to the infected computers," the authorization form reads.

FBI Special Agent Briana Neumiller, who has been involved in the Coreflood investigation and takedown, echoed that in a declaration supporting the government's request for more time to strike Coreflood.

"Removing Coreflood in this manner could be used to delete Coreflood from infected computers and to 'undo' certain changes made by Coreflood to the Windows operating system when Coreflood was first installed," Neumiller said. "The process does not affect any user files on an infected computer, nor does it ... access any data on the infected computer."

The DOJ and FBI did not say how many machines it has identified as candidates for its uninstall strategy, but told the judge that FBI field offices would be notifying affected people, companies and organizations.

link


User avatar
Dr Exile
Posts: 2349
Joined: Tue Apr 05, 2011 5:37 pm
Location: Skellig Michael

Re: Feds to remotely uninstall Coreflood bot from some PCs

Post by Dr Exile » Thu Apr 28, 2011 1:26 am

So what the #%*@ is Coreflood?
Credo quia absurdum.

MrPenny
Posts: 722
Joined: Mon Apr 04, 2011 1:10 pm

Re: Feds to remotely uninstall Coreflood bot from some PCs

Post by MrPenny » Thu Apr 28, 2011 1:35 am

The interwebz has this new thing.....it's called a "Google"? An amazing tool to lookup information on nearly any topic.

User avatar
Pigeon
Posts: 18065
Joined: Thu Mar 31, 2011 3:00 pm

Re: Feds to remotely uninstall Coreflood bot from some PCs

Post by Pigeon » Thu Apr 28, 2011 1:48 am

Another bot net where computers are taken over with malware and controlled remotely to send spam and do other deeds.

User avatar
Pigeon
Posts: 18065
Joined: Thu Mar 31, 2011 3:00 pm

Re: Feds to remotely uninstall Coreflood bot from some PCs

Post by Pigeon » Thu Apr 28, 2011 1:54 am

The "Coreflood" botnet is believed to have operated for nearly a decade and to have infected more than two million computers around the world, the Justice Department and FBI said in a joint statement.

They said charges of wire fraud, bank fraud and illegal interception of electronic communications had been filed against 13 suspects identified in court papers only as John Doe 1, John Doe 2, etc.

The complaint said they were all "foreign nationals" but provided no further information about their identities or nationalities.

Five "command and control" computer servers and 29 Internet domain names were seized as part of the operation, described as the "most complete and comprehensive enforcement action ever taken by US authorities to disable an international botnet."

A botnet is a network of malware-infected computers that can be controlled remotely from other computers.

Coreflood, which exploited a vulnerability in computers running Microsoft's Windows operating systems, was used to steal usernames, passwords and other private personal and financial information, US officials said.

As of February 2010, some 2.33 million computers were part of the Coreflood botnet, including 1.85 million in the United States, according to the complaint filed with the US District Court for the District of Connecticut.

"Infected computers in the Coreflood botnet automatically recorded the keystrokes and Internet communications of unsuspecting users, including online banking credentials and passwords," the complaint said.

"The defendants and their co-conspirators used the stolen data, including online banking credentials and passwords, to direct fraudulent wire transfers from the bank accounts of their victims," it added.

The complaint said the full extent of the financial loss is not known but it provided details on a number of victims.

They included a real estate company in Michigan hit for $115,771 in fraudulent wire transfers, an investment company in North Carolina taken for $151,201 and a defense contractor in Tennessee which lost $241,866.

Dave Marcus, research and communications director at McAfee Labs, said the cyber criminals behind Coreflood were apparently able to "turn the botnet into a money making machine."

"It is hard to estimate the actual loot, but the criminals likely made tens of millions of dollars, based on the estimates in the complaint filed by the Department of Justice," Marcus said. "It is not outside of the realm of possibility that they netted more than $100 million."

US attorney David Fein said the seizure of the Coreflood servers and the Internet domain names "is expected to prevent criminals from using Coreflood or computers infected by Coreflood for their nefarious purposes."

"These actions to mitigate the threat posed by the Coreflood botnet are the first of their kind in the United States and reflect our commitment to being creative and proactive in making the Internet more secure," added Shawn Henry of the FBI's Criminal, Cyber, Response and Services Branch.

In July of last year, US, Spanish and Slovenian law enforcement authorities announced the arrest of the suspected creator of the "Mariposa Botnet," which may have infected as many as eight million to 12 million computers around the world.

Link


Post Reply