The Federal Bureau of Investigation seized over 40 computers and arrested two individuals to break up two separate scareware cyber-crime outfits.
Federal law enforcement agents have arrested members of two cyber-crime gangs who may have netted more than $74 million by infecting user computers with scareware and then charging for fake antivirus software.
(Scareware generates pop-ups that imitate Windows System messages, and will usually advertise as a anti-virus software. They typically state that there is a list of issues such as: “Infected files have been found on your computer” and the user is prompted to purchase the software to fix the problem. Once the fake software is installed, Malware will be downloaded and infect the system. While purchasing the fake antivirus does make the scareware stop displaying the warnings, the user will have purchased harmful malware that can potentially corrupt the system and make it unusable. )
In an endeavor dubbed Operation Trident Tribunal, federal agents seized more than 40 computers, servers and bank accounts in the Netherlands, Latvia, Germany, France, Lithuania, Sweden and the United Kingdom, the Federal Bureau of Investigation said June 22. Of the computers seized, 22 were in the United States.
The two rings infected hundreds of thousands of computers with scareware programs using a variety of tricks, and then badgered users into forking over money for fake antivirus software to supposedly clean up the infection. The fake software ranged from $49.95 to $129 apiece, according to federal agents.
“Scareware is just another tactic that cyber-criminals are using to take money from citizens and businesses around the world,” said assistant director Gordon Snow of the FBI’s Cyber Division.
One cyber-crime gang infected over 960,000 computers using Web pages that performed fake online computer scans, costing users $72 million, according to the FBI. About 1 million people are thought to have been victimized, the FBI estimated. A second group is accused of netting $2 million through malicious advertisements online.
Two suspects were arrested in Rezekne, Latvia, in connection with the malvertisement scam and have been charged with two counts of wire fraud and one of conspiracy to commit wire fraud and computer fraud. They face up to 20 years in prison and fines of up to $250,000 on wire fraud and conspiracy charges, and up to 10 years and fines of $250,000 on computer fraud.
The duo, Peteris Sahurovs and Marina Maslobojeva, were arrested on charges made in a Minnesota court that they created phony advertising agency RevolTech Marketing to place advertisements for Best Western hotels on the Minneapolis Star Tribune’s Website in February 2010. The paper’s IT staff tested the online ad and found no problems with it. When the ad was running on the site, the suspects allegedly changed the code so that visitors were infected with a malicious software program that launched scareware on their systems.
“Visitors to the Startribune.com website began experiencing slow system performance, unwanted pop-ups and total system failure,” the Department of Justice said in the indictment. The pop-ups advertised fake security software, Antivirus Soft, for $49.95. The Star Tribune immediately took action and removed the ad from its site.
Federal officials raided a DigitalOne data center in Reston, Va., June 21 as part of this operation, InfoWorld reported. The FBI seized three racks of servers from the hosting facility, causing several Websites and services, including Curbed, Eater, Instapaper and Pinboard, to go offline.
“The global reach of the Internet makes every computer user in the world a potential victim of cyber-crime,” said U.S. Attorney B. Todd Jones of the District of Minnesota. The FBI worked with police in Cyprus, Germany, Latvia, Ukraine, France and Romania as well as with Canada’s Mounted Police and London’s Met Police.
For more information on how you can protect your privacy on the web, go to our website or check out our information on virus removal by clicking here.
You can also contact us by phone @: 949-699-6619
By email: support@orangecountycomputer.com
Written by deborah
Deborah is the Operations Director at Orange County Computer and has been with the company since 2004.
You might also like
- The Power of DNS Filtering
- Cybersecurity Awareness Month: Social Engineering
- Cybersecurity Awareness Month
- Farewell to QuickBooks Desktop Professional 2021: Navigating the Transition
- PII Compliance – Protecting Your Business from Costly Data Breaches: The Importance of Managed Services
- CISA Updates #StopRansomware Guide
- The Safeguards Rule: Financial Institutions Must Protect Client Data!
- AdSense Fraud Campaign: Is your site infected?
- Celebrating 25 Years as a Technology Solutions Provider!
- The Southwest Airlines IT Meltdown
- ‘Tis the season… to avoid holiday scams!
- Google Chrome Users, it’s Time to Say Goodbye to Windows 7