Europol Tackles Cybercrime Ring

1-eupoliceagen.jpg

Employees of Europol's Cybercrime Center EC3

Europol has cracked down on a cybercrime ring believed to have developed and distributed malware designed to steal valuable financial information.
Announced last week, Europol's latest cybercrime sting, conducted with the help of partners in Estonia, Latvia, Germany, Moldova, Poland, Ukraine and the US, resulted in the arrest of five suspects stemming from eight house searches and the seizure of computer equipment in multiple cities across Ukraine.
The joint operation, between Europol and Eurojust, focused on arresting suspects believes to have developed, exploited and distributed ZeuS and SpyEye malware. These two malware families are well known banking Trojans used by botnets and phishing campaigns worldwide.
"The cybercriminals used malware to attack online banking systems in Europe and beyond, adapting their sophisticated banking Trojans over time to defeat the security measures implemented by the banks. Each cybercriminal had their specialty and the group was involved in creating malware, infecting machines, harvesting bank credentials and laundering the money through so-called money mule networks," Europol says.
In addition, underground forums were used to trade stolen credentials, compromised bank account information and malware, and the group also sold their own hacking services and looked for new partners in cybercrime.
Europol says the cybercrime ring was "extremely" active and has infected tens of thousands of PCs -- as well subsequently targeting major banks. The damage caused by the cybercrime ring is believed to be at the €2m mark.
On 18 and 19 June, law enforcement arrested the suspects as part of a long-running investigation revolving around cybercrime in Europe, which was launched in 2013 by JIT members (Austria, Belgium, Finland, the Netherlands, Norway and the United Kingdom) to take down cybercriminals.
The total number of cybercriminals now arrested has reached 60, and JIT says the group has enjoyed "significant operational successes." The organization has collected terabytes of data as part of the investigation, which will now be used to track down other suspects.
Rob Wainwright, Director of Europol commented:
"In one of the most significant operations coordinated by the agency in recent years Europol worked with an international team of investigators to bring down a very destructive cybercriminal group. 

With our international partners, we are committed to fighting the threats brought about by malware and other forms of cybercrime, to realise safer technology infrastructures and online financial transactions for businesses and people the world over."
Earlier this year Europol took down the Beebone botnet, which is estimated to have infected over 12,000 computers with banking-based Trojans and additional malware. The organization used a technique called "sinkholing" to disrupt the botnet -- in other words, the team registered, suspended and seized domain names linking the command-and-control (C&C) center's communication channels to victim PCs. Europol called the botnet a "sophisticated" example due to its daily updates and software insurance policies against removal.
ZD Net:  http://zd.net/1GR6AL2

« Cyberwars Between Nations Are Difficult to Prove
Court Briefly Returns NSA Surveillance Program »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council is a leading collaborative effort between Government of India and Industry to raise Cybersecurity awareness nationally.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.