Europol Tackles Cybercrime Ring

1-eupoliceagen.jpg

Employees of Europol's Cybercrime Center EC3

Europol has cracked down on a cybercrime ring believed to have developed and distributed malware designed to steal valuable financial information.
Announced last week, Europol's latest cybercrime sting, conducted with the help of partners in Estonia, Latvia, Germany, Moldova, Poland, Ukraine and the US, resulted in the arrest of five suspects stemming from eight house searches and the seizure of computer equipment in multiple cities across Ukraine.
The joint operation, between Europol and Eurojust, focused on arresting suspects believes to have developed, exploited and distributed ZeuS and SpyEye malware. These two malware families are well known banking Trojans used by botnets and phishing campaigns worldwide.
"The cybercriminals used malware to attack online banking systems in Europe and beyond, adapting their sophisticated banking Trojans over time to defeat the security measures implemented by the banks. Each cybercriminal had their specialty and the group was involved in creating malware, infecting machines, harvesting bank credentials and laundering the money through so-called money mule networks," Europol says.
In addition, underground forums were used to trade stolen credentials, compromised bank account information and malware, and the group also sold their own hacking services and looked for new partners in cybercrime.
Europol says the cybercrime ring was "extremely" active and has infected tens of thousands of PCs -- as well subsequently targeting major banks. The damage caused by the cybercrime ring is believed to be at the €2m mark.
On 18 and 19 June, law enforcement arrested the suspects as part of a long-running investigation revolving around cybercrime in Europe, which was launched in 2013 by JIT members (Austria, Belgium, Finland, the Netherlands, Norway and the United Kingdom) to take down cybercriminals.
The total number of cybercriminals now arrested has reached 60, and JIT says the group has enjoyed "significant operational successes." The organization has collected terabytes of data as part of the investigation, which will now be used to track down other suspects.
Rob Wainwright, Director of Europol commented:
"In one of the most significant operations coordinated by the agency in recent years Europol worked with an international team of investigators to bring down a very destructive cybercriminal group. 

With our international partners, we are committed to fighting the threats brought about by malware and other forms of cybercrime, to realise safer technology infrastructures and online financial transactions for businesses and people the world over."
Earlier this year Europol took down the Beebone botnet, which is estimated to have infected over 12,000 computers with banking-based Trojans and additional malware. The organization used a technique called "sinkholing" to disrupt the botnet -- in other words, the team registered, suspended and seized domain names linking the command-and-control (C&C) center's communication channels to victim PCs. Europol called the botnet a "sophisticated" example due to its daily updates and software insurance policies against removal.
ZD Net:  http://zd.net/1GR6AL2

« Cyberwars Between Nations Are Difficult to Prove
Court Briefly Returns NSA Surveillance Program »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.