Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"​FBI and UK cops smash Dridex high-stakes bank-raiding botnet", via ZDNet


  • Please log in to reply
1 reply to this topic

#1 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,664 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 AM

Posted 16 October 2015 - 11:17 AM

Joint efforts by law-enforcement agencies in the US and UK have crippled an eastern European gang behind the bank credential-stealing botnet known as Dridex.
On Tuesday, the FBI announced charges against Andrey Ghinkul, the alleged administrator of the Dridex botnet - also known as Bugat or Cridex - and revealed that it is seeking his extradition from Cyprus, where he was arrested in late August.

Dridex malware has been around for several years and is known for largely targeting Windows machines at companies in the UK and US, usually through phishing email with malware-laced Word attachments.


Source: http://www.zdnet.com/article/fbi-and-uk-cops-smash-dridex-a-high-stakes-bank-raiding-botnet/

Another big hit to yet another big source of malware infection.

Related article(s):

https://nakedsecurity.sophos.com/2015/10/15/dridex-botnet-taken-down-multi-million-bank-fraud-suspect-arrested/ - Naked Security

Edited by Aura, 16 October 2015 - 11:29 AM.

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


BC AdBot (Login to Remove)

 


#2 dannyboy950

dannyboy950

  • Members
  • 1,338 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:port arthur tx
  • Local time:05:33 AM

Posted 16 October 2015 - 01:47 PM

Sadly for every one that is found there are more still out there that are yet unknown or haven't been caught yet.

Bot nets are now big business in and of itself.  Botnets for hire, bot nets of bots to be resold you name it it's out there.


HP 15-f009wm notebook AMD-E1-2100 APV 1Ghz Processor 8 GB memory 500 GB Hdd

Linux Mint 17.3 Rosa Cinamon





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users