Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Alleged Author of MegalodonHTTP Malware Arrested

Norwegian authorities have arrested an individual suspected of being the author of MegalodonHTTP, a piece of malware designed to power distributed denial-of-service (DDoS) botnets.

Norwegian authorities have arrested an individual suspected of being the author of MegalodonHTTP, a piece of malware designed to power distributed denial-of-service (DDoS) botnets.

Europol announced in mid-December the results of an international operation targeting individuals suspected of using remote access Trojans (RATs). The operation, dubbed Falling sTAR, resulted in the arrests of 12 people from France, Norway and Romania.

As part of Operation Falling sTAR, Norwegian police arrested five men aged between 16 and 24, and seized computer equipment and online accounts. These individuals were arrested on suspicion of possessing, using and selling malware.

Some of them admitted that they had been using malware for several years, and one even admitted running an online store dedicated to selling malware, police said.

Advanced persistent threat (APT) detection company Damballa, whose Threat Discovery Center assisted Norwegian authorities in their investigation, revealed on Thursday that one of the five suspects arrested in December is believed to be the author of the MegalodonHTTP malware.

The security firm says it’s not at liberty to disclose the suspect’s real identity, but it has confirmed that the online moniker used by MegalodonHTTP’s author, Bin4ry, is no longer active or doing business.

When it analyzed MegalodonHTTP in November, Damballa noted that the threat was simple and apparently developed by someone with poor coding skills.

Bin4ry advertised the malware on hacker forums as a threat capable of launching seven types of DDoS attacks, opening a remote shell on the infected system, mining crypto currency, and killing antiviruses. The author offered two packages priced at $35 and $100, depending on what the user needed.

Advertisement. Scroll to continue reading.

While the malware isn’t very sophisticated, especially since it needs .NET to be installed on the victim’s machine to run properly, its low price and the fact that it could quickly and easily be set up even by less skilled users might have made it attractive for some cybercriminals.

Related: Alleged Malware Service Operators Arrested in UK

Related: International ATM Malware Gang Dismantled

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Cybercrime

A look into recent cryptocurrency tracing and recovery operations by the FBI and UK’s Metropolitan Police