Cybercrime

Microsoft Takes Down Kelihos Botnet, Names Defendants

Microsoft Crushes Another Botnet: “Operation b79” Neutralizes Kelihos Botnet

Microsoft today announced it has taken down the notorious Kelihos botnet, scoring yet another legal victory in the battle against the botnet business.

<p><strong><span><span>Microsoft Crushes Another Botnet: "Operation b79" Neutralizes Kelihos Botnet</span></span></strong></p><p><span><span><strong>Microsoft</strong> today announced it has taken down the notorious <strong>Kelihos botnet</strong>, scoring yet another legal victory in the battle against the botnet business.</span></span></p>

Microsoft Crushes Another Botnet: “Operation b79” Neutralizes Kelihos Botnet

Microsoft today announced it has taken down the notorious Kelihos botnet, scoring yet another legal victory in the battle against the botnet business.

Also known as Waledac 2.0, Kelihos is estimated to have as many as 41,000 bots. In its complaint, Microsoft alleges Dominique Alexander Piatti, dotFREE Group SRO and 22 others identified as “John Does” own the cz.cc domain, which they used to register other subdomains such as lewgdooi.cz.cc that were in turn used to control the botnet.

“Our investigation showed that while some of the defendant’s subdomains may be legitimate, many were being used for questionable purposes with links to a variety of disreputable online activities,” blogged Richard Domingues Boscovich, senior attorney with Microsoft’s Digital Crimes Unit.

“For instance, our investigation revealed that in addition to hosting Kelihos, defendants’ cz.cc domain has previously been investigated for hosting subdomains responsible for delivering MacDefender, a type of scareware that infects Apple’s operating system. Also, in May 2011, Google temporarily blocked subdomains hosted by the cz.cc domain from its search results after it discovered it was hosting malware, although Google reinstated the subdomains after the defendant allegedly corrected the problem,” Boscovich added.

According to Microsoft, in its investigation of the botnet’s command and control infrastructure, 3,700 subdomains were identified as being hosted in the Czech Republic by a single hoster that had more than 215,000 subdomains hosting malware. In May, Google temporarily blocked more than 200,000 of these, but later reinstated them after the problem was believed to have been corrected.

Microsoft filed for an ex parte temporary restraining order Sept. 22 in the U.S. District Court for the Eastern District of Virginia. Piatti and dotFREE Group SRO were served with notice of the lawsuit Sept. 26.

“Naming these defendants also helps expose how cybercrime is enabled when domain providers and other cyber infrastructure providers fail to know their customers,” Boscovich blogged. “Without a domain infrastructure like the one allegedly hosted by Mr. Piatti and his company, botnet operators and other purveyors of scams and malware would find it much harder to operate anonymously and out of sight. By taking down the botnet infrastructure, we hope that this will help deter and raise the cost of committing cybercrime.”

Advertisement. Scroll to continue reading.

Related Reading: Authorities Takedown Coreflood Botnet

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version