Spanish Police Arrest Mariposa Botnet Masterminds

Three men who allegedly ran the Mariposa botnet that spread malicious programming to millions of PCs in 190 countries, have been arrested by Spanish security forces, who worked in conjunction with security firms Defense Intelligence and Panda Security.

“Mariposa” means butterfly in Spanish, but the actual botnet was anything but small and delicate, being one of the largest ever shut down. Targeted data included bank account details, user names and passwords, with enslaved PCs also forced into denial-of-service attacks. The ringleaders also used the botnet to sell pay-per-install toolbars and stolen credentials for online services.

According to Defense Intelligence, Mariposa managed to compromise more than 11 million unique IPs between 23 December, 2009 and 9 February. The botnet spread through a combination of instant messenger programs, P2P networks and USB keys, with Defense Intelligence observing attempts to utilise MSN Messenger to spread malicious code.

“Our preliminary analysis indicates that the botmasters did not have advanced hacking skills,” Pedro Bustamante, senior research advisor at Panda Security, wrote in a 3 March statement. “This is very alarming because it proves how sophisticated and effective malware distribution software has become, empowering relatively unskilled cyber-criminals to inflict major damage and financial loss.”

Defense Intelligence claims it had been tracking Mariposa since May 2009. A Mariposa Working Group of IT security personnel managed to infiltrate Mariposa’s command-and-control structure late in 2009, according to a Panda Security statement, and then used the information gleaned from analysing the botnet’s servers to initiate a co-ordinated shutdown on 23 December. Shortly after that shutdown, hackers launched a retaliatory Denial of Service attack against Defense Intelligence, which managed to knock a subset of customers for one ISP offline for a brief period.

Spanish police later arrested the three men suspected of masterminding the botnet. One of those botmasters worked during the noms de guerre “Netkairo” and “hamlet1917,” and partnered with two other individuals operating under the handles “Ostiator” and “Johnyloleante.”

“Mariposa’s the biggest ever to be shut down, but this is only the tip of the iceberg,” Mark Rasch, former head of the Justice Department’s computer crimes unit, is quoted by Reuters in a 3 March article. “These things come up constantly.”

IT companies and local governments have been moving recently to shut down botnets, which have an ever-increasing capability to compromise the personal information of millions of people. On 22 February, a federal judge in Virginia responded to a complaint by Microsoft and ordered the shutdown of 277 Internet domains associated with Waledac, a botnet supposedly responsible for infecting hundreds of thousands of computers worldwide, as well as 651 million spam emails that clogged Hotmail inboxes between 3-21 December, 2009.

Nicholas Kolakowski eWEEK USA 2013. Ziff Davis Enterprise Inc. All Rights Reserved.

Share
Published by
Nicholas Kolakowski eWEEK USA 2013. Ziff Davis Enterprise Inc. All Rights Reserved.
Tags: arrestBotnet

Recent Posts

Tesla Fires Software, Service, Engineering Staff

Tesla lays off software, service, engineering staff after disbanding Supercharger team, as major cull continues

4 hours ago

Grayscale Bitcoin Shares Surge On First Inflow Since January

Dominant Bitcoin ETF Grayscale Bitcoin Trust shows first net inflow since January as investors flock…

4 hours ago

US Crypto Campaign Funding Groups Raise $102m

US campaign funding groups backed by cryptocurrency sector raise more than $102m as firms seek…

5 hours ago

Robinhood Served With SEC Crypto Enforcement Notice

Robinhood Markets says it received SEC enforcement notice over cryptocurrency trading platform amidst ongoing crackdown

5 hours ago

Synopsys Spins Off App Security Unit In $2.1bn Deal

Chip designer Synopsys to sell software integrity unit to private investors to create new independent…

5 hours ago