Skip to main content

Massive Criminal Server Exposed

Massive Criminal Server Exposed

At the Black Hat conference last week, Joe Stewart of security firm SecureWorks reported on shutting down the main server for Coreflood, a criminal network that grew from a Trojan to become a massive repository of stolen data.

Coreflood was really noticed in 2004, when hackers infected a company with a Trojan and stole money from a US company. After that, however, it appeared to go underground. But earlier this year SecureWorks and Spamhaus shut down one of its servers and discovered 50 GB of stolen data – although SecureWorks says more than four times this amount had been previously harvested and discarded. The data included 3,233 credit card usernames and passwords, 8,485 bank and credit union usernames and passwords – all in all, a total of just under half a million usernames and passwords to over 35,000 domains.

How did they do it? By being slow and careful. After infecting one machine in a network they’d continue through the network until reaching a computer with administrative access, then use that to ensure infection of the entire network.

The good news is that the server was shut down. The bad news? The botnet it created remains active – everything has simply moved to Russia, and there may be more activity coming according to Stewart, who noted that one directory, created “a couple of weeks before we took the server offline, contained a Microsoft PowerPoint exploit, indicating the Coreflood group may have been interested in pursuing targeted attacks similar to those used by Chinese and Romanian hacking groups in recent months.”

Editors' Recommendations

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
This massive exploit lets hackers breach apps like Chrome, 1Password, and Telegram
A dark mystery hand typing on a laptop computer at night.

A massive security bug has just been discovered that affects WebP images used in untold numbers of websites and apps, and it could potentially let hackers break into your computer and extract data from it. In fact, Google has already seen it being actively exploited in the wild. Because of that, it’s essential that you patch your computer as soon as possible.

The discovery has been detailed by researcher Alex Ivanovs, who wrote about the bug in a blog post. Right now, it seems to affect almost all of the best web browsers, including Chrome, Firefox, Edge, and Brave. WebP images are used all over the web, meaning huge numbers of sites and apps could be affected.

Read more
MSI just fixed a massive problem affecting Intel’s best CPUs
Blue screen of death on on TV.

There's some good news if your PC has been struggling with the Blue Screen of Death -- you can stop troubleshooting and simply download a new update from MSI. Following a recent Windows Update, many users started to experience the issue and couldn't even boot up their PCs. The problem was quickly narrowed down to a combination of some of the best Intel processors and MSI motherboards, but now, a fix has been found.

The issue was initially reported last month and started popping up immediately after a new Windows Update has been released. After installing the KB5029351 update, users started getting blue screens with the error code "UNSUPPORTED_PROCESSOR." Afterward, the PC would attempt to restart, but the blue screen would just pop right back up and make it impossible to boot the computer. Luckily, the update would eventually uninstall itself and the PC would once again be useable, but there was still clearly a problem here.

Read more
Ransomware attacks have spiked massively. Here’s how to stay safe
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

No one wants to fall victim to ransomware, but a new report from blockchain security firm Chainalysis claims that ransomware payments could be set for a record-breaking year, with criminals raking in close to half a billion dollars just seven months into 2023.

According to the analysis, ransomware payments this year have totaled $449.1 million so far. That’s $175.8 million more than this time last year, suggesting that hackers have doubled down on this method of extracting money from unfortunate victims.

Read more