Menu
Europol and security vendors disrupt massive Ramnit botnet

Europol and security vendors disrupt massive Ramnit botnet

The operation seized command-and-control servers and Internet domains used by the Ramnit gang

European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.

Ramnit started out in 2010 as a computer worm capable of infecting EXE, DLL, HTM, and HTML files. However, over time it evolved into an information-stealing Trojan that's distributed in a variety of ways.

Ramnit is capable of hijacking online banking sessions, stealing session cookies which can then be used to access accounts on various sites, copying sensitive files from hard drives, giving attackers remote access to infected computers and more.

Researchers from antivirus vendor Symantec described the malware program as "a fully-featured cybercrime tool" in a blog post Wednesday and said that it infected over 3.2 million computers over its five years of existence.

Symantec, Microsoft and threat intelligence firm AnubisNetworks assisted Europol and law enforcement investigators from Germany, Italy, the Netherlands, and the U.K. in disrupting the cyberinfrastructure that was used to control the Ramnit botnet.

The operation involved the seizure of servers in four countries and the filing of a lawsuit last week in a U.S. federal court by Microsoft and the Financial Services Information Sharing and Analysis Center. Three hundred domain addresses used by the botnet's operators have also been seized.

Law enforcement and the private sector need to work together to protect people online, said David Finn, associate general counsel and executive director of the Microsoft Cybercrime Center, in a blog post. "That's because the complexity of fighting cybercrime is bigger than any one company or organization. It requires a diverse set of skills, including sophisticated computer forensics, big data analysis and legal strategy."

According to Symantec, the Ramnit botnet was still very active and consisted of around 350,000 compromised computers when the takedown operation was launched. The most affected countries are India with 27 percent of the victims, Indonesia with 18 percent and Vietnam with 12 percent. The U.S. is in fifth place, accounting for 6 percent of infected systems.

Symantec released a stand-alone tool that allows users to check their computers for Ramnit infections and clean them.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags online safetysymantecMicrosoftsecurityAnubisNetworkslegalspywaremalwarecybercrimeEuropol

Featured

Slideshows

A snapshot of the Kiwi partners set to shine at the Reseller News Awards

A snapshot of the Kiwi partners set to shine at the Reseller News Awards

With the 2017 Reseller News ICT Industry Awards only weeks away, Reseller News profiles the power line-up of partners set to dominate the biggest night on the channel calendar. ​Ranging from the enterprise, down through the mid-market and small business sectors into the heart of the start-up scene, the end result is the most diverse and wide-ranging partner line-up in the history of the Awards, playing host to the leading innovators of the past 12 months.​

A snapshot of the Kiwi partners set to shine at the Reseller News Awards
Channel celebrates as HP marks 50 years in NZ

Channel celebrates as HP marks 50 years in NZ

HP marked 50 years in New Zealand at an event in the vendor's Auckland's headquarters last night, with a host of key channel figures coming along to celebrate. Photos by HP.

Channel celebrates as HP marks 50 years in NZ
Show Comments