Russian News  
Analysis: Global cyber-crime case cracked

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Dec 4, 2007
The investigation of a relatively minor computer crash at the University of Pennsylvania last year led law enforcement agencies from three countries to a multimillion-dollar cyber-crime syndicate writing computer viruses to order and renting out networks of millions of compromised slave PCs to other online criminals.

According to investigators and court documents, the cases that arose out of the February 2006 incident, in which computers at the university crashed after being used to store hacker programs, represent both ends of the spectrum of cyber-crime: from the disgruntled student to the sophisticated organized crime syndicate.

Ryan Goldstein, the Pennsylvania student known by the login ID Digerati who was indicted last month for causing the crash and for conspiring to launch Internet attacks against several Web discussion forums from which he had been barred, was essentially a cyber-vandal out for revenge rather than a criminal seeking to profit from his work, say investigators.

Goldstein has pleaded not guilty and faces trial in March next year. If convicted, he faces a maximum of five years in jail and a $250,000 fine.

"The computer intrusions (Goldstein is charged with) were basically destructive nuisance attacks," Jerria Williams, spokeswoman for the FBI in Philadelphia, told United Press International.

But at the other end of the investigation lies the burgeoning world of online organized cyber crime, in which multinational gangs, often made up of people who know each other only by their screen names or login IDs, collaborate to steal passwords and bank account information from unsuspecting computer users; scam marketing schemes; and target researchers trying to develop anti-virus software.

Owen Walker, the 18-year-old with the screen name AKill who was arrested and had his computer seized last week by police in Waikato, New Zealand, was described by investigators there in a statement as the alleged head of an elite international cyber-crime ring known as the A-Team.

Walker has not been charged with any crime yet, but police say their inquiries are continuing.

Staff at the University of Pennsylvania first alerted the Philadelphia office of the FBI after hacker software was found on a server at the School of Engineering and Applied Sciences. The server crashed Feb. 26 after receiving 70,000 requests from other computers to download the program, which turned out to be a new target package for a hacker-controlled botnet.

Botnets, short for robot networks, are collections of computers that -- often unknown to their owners, who tend to be less computer-savvy or careful individuals -- have been compromised by hacker programs known as malware, short for malicious software.

The programs turn the infected computers into virtual slaves for hackers, known as bot-herders, who can use them to send spam e-mail, mount Internet attacks or commit other kinds of cyber crime. The computers are often also infected with programs known as key-stroke loggers that can steal passwords and other account information from users and send it back to the bot-herder.

Botnets can be used to mount the crudest form of cyberattack, called Distributed Denial of Service attacks, in which the thousands of slave computers overwhelm the server hosting a Web site or other target by flooding it with fake Internet traffic.

But in order to launch such an attack, the slave computers must each download targeting instructions and other malware. Since botnets can contain tens or even hundreds of thousands of computers, the downloads generate very heavy traffic, requiring a large-capacity server to handle it.

According to Patricia Hartman, a spokesman for the U.S. Attorney for the Eastern District of Pennsylvania, Goldstein prevailed upon Walker to use his botnet to launch DDoS attacks on several Internet discussion forums from which he had been banned.

The New Zealand hacker told him "basically, 'I can do it, but I need a place to load this software,'" said Hartman.

Martin Kleintjes, head of the New Zealand police's Electronic Crime Center, described Walker as "one of the world leaders" in developing malware.

"He's very bright, very skilled at what he's doing," he told a radio interviewer last week.

And indeed, when his software turned up on the university server, it raised some eyebrows. "This program was viewed by the FBI as being very sophisticated," said Detective Inspector Peter Devoy of the Waikato police.

Kleintjes said investigators from the FBI, New Zealand police and the Dutch Independent Post and Telecommunications Authority had been able to use Goldstein's messages to Walker to track him down.

"There's this misconception out there that people can remain anonymous (on the Web), but that's not the case," he said. "The surveillance technology allows us to look at Internet traffic in between countries and work our way back" to the perpetrators.

He said that Walker had been "head of an international spy(ware) and bot ring" that had "infiltrated a large number of computers around the world with their malicious software" allowing "other cyber criminals �� who hire his services" to carry out "other types of cyber crime."

The U.S. indictment suggests that the botnet Walker used to help Goldstein was made up of at least 70,000 computers -- the number that tried over a four-day period to download the target package stored on the University of Pennsylvania server.

But New Zealand police say a separate investigation had linked Walker with a malware scheme based in the Netherlands, alleged to have infected 1.3 million computers world wide.

"The Netherlands is the world's third-largest distributor of malware and was chosen because of its superior data transmission infrastructure," said a statement.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Analysis: A new USAF cyber-war doctrine
Washington (UPI) Oct 17, 2007
Recent pronouncements by U.S. Air Force officials about their view of cyberspace as a war-fighting domain have attracted little attention. But the questions they raise for U.S. military policy and doctrine are profound.







  • Behind the Kitty Hawk spat
  • OSCE presidency urges Russia to reconsider arms treaty move
  • Euro Thaw Not What It Seems
  • US, China, feud over Taiwan, Tibet, port dispute

  • Walker's World: Iran's new Gulf friends
  • Ahmadinejad Declares Nuclear Victory Says Iran Needs 50000 Centrifuges
  • Cheney: Iran report may hinder US policy
  • 'More effective sanctions' needed to stop Iran: Israeli minister

  • Process On For Establishing Aerospace Command
  • Cisco plans to turn India into global hub, triple workforce

  • Youth crime in China explodes as social values decline: report
  • Chinese archaeologists dig up 4,000-year-old city
  • Workers in China strike over rising food costs: officials
  • China's vast sovereign wealth fund to be 'stabilising force': report

  • World's first floating wind turbine launched in Berlin
  • Germany to get first offshore windfarm in 2009
  • Energy Lab Sets Aggressive Greenhouse Gas Reduction Goal
  • Laser Technologies Used To Analyze Combustion Of Biofuels

  • New space mission aims to broaden Europe's ISS role
  • The European Columbus Space Laboratory Set To Reach ISS
  • Jules Verne ATV Given Its Wings
  • Spacewalkers Complete More Harmony Hookup Work

  • Harris Tests New Falcon III Multiband Manpack Radio During US Army Patriot Missile Exercise
  • SKorea develops military communication system: officials
  • Boeing Submits Proposal To USAF For Common Range Integrated Instrumentation System
  • Boeing Demonstrates Maturity Of TSAT Encryption System

  • Rafael Upgrades German Eurofighters With Litening Navigation And Targeting Pods
  • EaglePicher Technologies Receives Contract To Support Automated Manufacturing Of Missile Batteries
  • Boeing Wins US Air Force B-1B Upgrade Contract
  • Northrop Grumman's LITENING Advanced Targeting System Achieves Operational Availability Milestone

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement