Popular Posts
-
Does your small business have a website? If not, it's time to build one. Companies without an online presence face an incredibly diffi...
-
Donald J. Trump has entered presidential politics like a force of nature, thrilling some, horrifying others, and contributing to a nominat...
-
Published Thursday, Jul. 28, 2016, 7:16 pm Front Page » Podcasts, Etc. » Video: Two new episodes of God and Country Music web TV ser...
-
/EINPresswire.com/ -- SANTA FE, NM--(Marketwired - October 15, 2016) - CrowdReviews.com, an online platform for B2B service reviews, urges...
-
We can offer a wide variety of hosting options such as Amazon Web Services, Microsoft's Azure, Nexcess, WPengine, Liquid Web, Panthe...
-
The costs of setting up and maintaining a website can add up quickly and it is not an easy task to make the choices at the start and sta...
-
El Segundo, CA – Setting up one's own online identity is a tedious task to make, especially setting up an online business, given t...
-
Introduction I am writing this article as a result of my learning for deploying ASP.NET Core web applications on Linux boxes. There is a ...
-
editor rating: good Comments June 12, 2015 Pros Strong security features. Robust app library. Powerful WordPr...
-
Update Florida-based web hosting company Web.com on Tuesday announced that it had suffered a data breach and payment card and personal inf...
Blog Archive
- December (19)
- November (25)
- October (28)
- September (26)
- August (28)
- July (31)
- June (26)
- May (27)
- April (28)
- March (30)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (29)
- August (44)
- July (56)
- June (53)
- May (54)
- April (48)
- March (55)
- February (44)
- January (3)
- December (5)
- November (5)
- October (26)
- September (25)
- August (29)
- July (26)
- June (18)
- September (1)
About Me
Total Pageviews
Krebs on Security
In what's being billed as an unprecedented global law enforcement response to cybercrime, federal investigators in the United States, United Kingdom and Europe today say they've dismantled a sprawling cybercrime machine known as "Avalanche" — a distributed, cloud-hosting network that for the past seven years has been rented out to fraudsters for use in launching countless malware and phishing attacks.

The global distribution of servers used in the Avalanche crime machine. Source: Shadowserver.org
According to Europol, the action was the result of a four-year joint investigation between Europol, Eurojust the FBI and authorities in the U.K. and Germany that culminated on Nov. 30, 2016 with the arrest of five individuals, the seizure of 39 Web servers, and the sidelining of more than 830,000 web domains used in the scheme.
Built as a criminal cloud-hosting environment that was rented out to scammers, spammers other ne'er-do-wells, Avalanche has been a major source of cybercrime for years. In 2009, when investigators say the fraud network first opened for business, Avalanche was responsible for funneling roughly two-thirds of all phishing attacks aimed at stealing usernames and passwords for bank and e-commerce sites. By 2011, Avalanche was being heavily used by crooks to deploy banking Trojans.
The U.K.'s National Crime Agency (NCA), says the more recent Avalanche fraud network comprised up to 600 servers worldwide and was used to host as many as 800,000 web domains at a time.
"Cyber criminals rented the servers and through them launched and managed digital fraud campaigns, sending emails in bulk to infect computers with malware, ransomware and other malicious software that would steal users' bank details and other personal data," the NCA said in a statement released today on the takedown. The criminals used the stolen information for fraud or extortion. At its peak 17 different types of malware were hosted by the network, including major strains with names such as goznym, urlzone, pandabanker and loosemailsniffer.At least 500,000 computers around the world were infected and controlled by the Avalanche system on any given day."
The Avalanche network was especially resilient because it relied on a hosting method known as fast-flux, a kind of round-robin technique that lets botnets hide phishing and malware delivery sites behind an ever-changing network of compromised systems acting as proxies.
"The complex setup of the Avalanche network was popular amongst cybercriminals, because of the double fast flux technique offering enhanced resilience to takedowns and law enforcement action," Europol said in its statement.
It's worth noting here that Avalanche has for many years been heavily favored by crime gangs to deploy Zeus and SpyEye malware variants involved in cleaning out bank accounts for a large number of small to mid-sized businesses. These attacks relied heavily on so-called "money mules," people willingly or unwittingly recruited into helping fraudsters launder stolen funds.
At the time of the takedown, the Avalanche cybercrime infrastructure spanned more than 180 countries, according to The Shadowserver Foundation, a nonprofit group that helped authorities gain control over the Avalanche domains. Read more on Shadowserver's role in this effort here.

The Avalanche crime infrastructure. Image: Europol
Tags: Avalanche, double fast-flux, Eurojust, Europol, fbi, NCA, Shadowserver Foundation, U.K. National Crime Agency
This entry was posted on Thursday, December 1st, 2016 at 1:50 pm and is filed under Other. You can follow any comments to this entry through the RSS 2.0 feed. You can skip to the end and leave a comment. Pinging is currently not allowed.
Source: Krebs on Security
0 comments:
Post a Comment