This week, one of the world’s largest active botnets was finally brought down in an operation undertaken by a taskforce at Europol with the help of specialists from Symantec, Microsoft, and Anubis Networks.
Made possible by the notorious Ramnit malware, the 3.2 million-strong botnet was employed for a slew of nefarious activities, including massive spam campaigns, DDoS attacks, and virus distribution across thousands of separate networks.
Though the team behind the bust refused to name the group responsible for Ramnit, they told reporters that the server seizures spanned four different countries, all independently operating from one another and tasked with various parts of a puzzle that worked in concert to maintain the syndicated crime spree.
Because Ramnit was so versatile, it was capable of everything from flooding social networks with infected links to building backdoor trojans in individual systems. It’s said the tool was preferred by many high profile hackers due to its modular nature, which could be actively updated to deal with efforts to prevent its spread as it moved from one machine to the next.
When asked about the effect that the takedown of Ramnit would have, Steve Rye of the National Crime Agency told reporters that “…as a result of this action, the world is safer from RAMNIT, but it is important that individuals take action now to disinfect their machines, and protect their personal information.”
- From pranks to nuclear sabotage, this is the history of malware
- Crime-predicting A.I. isn’t science fiction. It’s about to roll out in India
- Strava responds to claims that its app compromised military secrecy
- Thieves heist 600 PCs built for digital coin mining in Iceland
- ZTE and Huawei respond to intelligence agency warnings over security risks