Google has won a lawsuit against operators of a botnet named Glupteba, which the internet giant disrupted last year.
Google announced in December 2021 that it had taken action to disrupt the botnet’s C&C infrastructure. The company said at the time that even if its actions may not completely stop the botnet, they should still affect its operators’ ability to conduct future operations. It’s unclear if the botnet is currently active.
Glupteba had been powered by one million compromised Windows devices. The Glupteba malware could steal user credentials and other data, mine cryptocurrencies, and turn compromised devices into proxies.
When it announced disrupting the botnet, Google also said it had filed a lawsuit against its alleged operators, claiming violations of the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act, and the Lanham Act, as well as tortious interference of business relationships and unjust enrichment.
The lawsuit named Russian nationals Dmitry Starovikov and Alexander Filippov, who allegedly helped lead the criminal enterprise, as well as 15 Does who had some role in operating the Glupteba botnet.
A Southern District of New York court this week granted Google default judgment and issued monetary sanctions against the defendants and their US-based council. They were ordered to pay Google’s attorney fees, which is a rare occurrence.
Starovikov and Filippov have been accused of misleading the court numerous times and litigating in bad faith. Specifically, they initially appeared to be willing to cooperate, but it seems they had an ulterior motive.
Judge Denise Cote said they did not intend to defend themselves against Google in court and instead they were planning on abusing the court system and discovery rules to obtain information that would help them bypass Google’s efforts to shut down the botnet.
At one point they proposed a settlement that involved Google paying them $1 million each and not reporting them to law enforcement, in exchange for information about the bitcoin addresses associated with the botnet and the promise that they would not engage in any criminal activity in the future. Google rejected their ‘extortionate’ offer and reported it to law enforcement.
The court found that “the Defendants have engaged in a willful campaign to resist discovery and mislead the Court. Their attorney has been complicit in this scheme, making inconsistent representations to the plaintiff and to the Court, and exploiting these representations in discovery and settlement negotiations.”
Court documents show that the defendants are aware and cautious regarding the possibility that they could be extradited to the United States if they travel to countries with an extradition treaty. Given the current relations between the US and Russia, they likely feel safe in Russia.
Related: NSO Turns to US Supreme Court for Immunity in WhatsApp Suit
Related: Russian Who Helped Kelihos Malware Evade Detection Sentenced to 4 Years in Prison
Related: Major Cybersecurity Breach of US Court System Comes to Light

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
Latest News
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- Microsoft Will Pay $20M to Settle US Charges of Illegally Collecting Children’s Data
- KeePass Update Patches Vulnerability Exposing Master Password
