This article is from the source 'nytimes' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.nytimes.com/2014/06/03/world/europe/battling-destructive-computer-viruses-agents-seize-networks-used-by-hackers.html

The article has changed 6 times. There is an RSS feed of changes available.

Version 0 Version 1
Battling Destructive Computer Viruses, Agents Seize Networks Used by Hackers Battling Destructive Computer Viruses, Agents Seize Networks Used by Hackers
(about 2 hours later)
WASHINGTON — Government agents seized control of two computer networks that are used by hackers to steal banking information and lock files on infected computers, officials in the United States and Europe said Monday, disrupting the circulation of two of the world’s most pernicious viruses, which have infected millions of computers worldwide.WASHINGTON — Government agents seized control of two computer networks that are used by hackers to steal banking information and lock files on infected computers, officials in the United States and Europe said Monday, disrupting the circulation of two of the world’s most pernicious viruses, which have infected millions of computers worldwide.
The coordinated strike targeted malware known as GameOver Zeus, which is known to steal bank information and send it to overseas hackers, and CryptoLocker, which burrows into computers and encrypts personal data. The hackers then demand a ransom to unlock the files.The coordinated strike targeted malware known as GameOver Zeus, which is known to steal bank information and send it to overseas hackers, and CryptoLocker, which burrows into computers and encrypts personal data. The hackers then demand a ransom to unlock the files.
Over the weekend, government agents in Europe and the United States took control of the servers that operated the attacking software and identified a 30-year-old suspect from Russia, Evgeniy Bogachev, also known as Lucky12345, as the man behind the attacks, according to court documents..Over the weekend, government agents in Europe and the United States took control of the servers that operated the attacking software and identified a 30-year-old suspect from Russia, Evgeniy Bogachev, also known as Lucky12345, as the man behind the attacks, according to court documents..
The Justice Department announced plans to hold a news conference Monday afternoon to discuss the operation. Europol, the European Union’s police intelligence agency, said Mr. Bogachev would be placed on the F.B.I.'s list of most-wanted cyber criminals, beside the Chinese officials whom the United States accused last month of economic espionage. The Justice Department held a news conference Monday afternoon to discuss the operation. Europol, the European Union’s police intelligence agency, said Mr. Bogachev would be placed on the F.B.I.'s list of most-wanted cyber criminals, beside the Chinese officials whom the United States accused last month of economic espionage.
CryptoLocker, a piece of software known as ransomware, has been spreading since last year. Once it infects a computer, the software searches for personal files, then encrypts them, making them inaccessible without a code.CryptoLocker, a piece of software known as ransomware, has been spreading since last year. Once it infects a computer, the software searches for personal files, then encrypts them, making them inaccessible without a code.
The software then demands hundreds of dollars to unlock them. People who do not pay the ransom see their files deleted forever. Security experts say people have paid untold millions to avoid that fate.The software then demands hundreds of dollars to unlock them. People who do not pay the ransom see their files deleted forever. Security experts say people have paid untold millions to avoid that fate.
“CryptoLocker infections are massively underreported,” said Rik Ferguson, vice president of security research for Trend Micro, which he said was one of many private security firms that worked with investigators. “Especially in business, it’s easier to pay the ransom.”“CryptoLocker infections are massively underreported,” said Rik Ferguson, vice president of security research for Trend Micro, which he said was one of many private security firms that worked with investigators. “Especially in business, it’s easier to pay the ransom.”
While both pieces of software are distributed through spam emails, they accomplish different things, each incredibly damaging.While both pieces of software are distributed through spam emails, they accomplish different things, each incredibly damaging.
Once inside a computer, GameOver Zeus steals data such as the login information to personal bank accounts. It then takes control of the computer to send spam emails attacking others. The software is run across an ever-changing network of computers, not a single hub, making it difficult to shut down. Federal investigators say GameOver Zeus has cost people more than $100 million in direct and indirect losses.Once inside a computer, GameOver Zeus steals data such as the login information to personal bank accounts. It then takes control of the computer to send spam emails attacking others. The software is run across an ever-changing network of computers, not a single hub, making it difficult to shut down. Federal investigators say GameOver Zeus has cost people more than $100 million in direct and indirect losses.
CryptoLocker uses emails that look like they are from legitimate businesses, including fake tracking notices from FedEx and U.P.S. Once inside a network, such as a company’s computer system, the virus can spread from one computer to the next.CryptoLocker uses emails that look like they are from legitimate businesses, including fake tracking notices from FedEx and U.P.S. Once inside a network, such as a company’s computer system, the virus can spread from one computer to the next.
As it spreads, the software locks up computer files and demands payment within three days. Some people have had their files deleted even after paying the ransom, according to the Department of Homeland Security.As it spreads, the software locks up computer files and demands payment within three days. Some people have had their files deleted even after paying the ransom, according to the Department of Homeland Security.