MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
botnet
Recherche

FBI, Air Force investigators mapped North Korean botnet to aid shutdown

jeudi 31 janvier 2019, 02:45 , par Ars Technica
Enlarge / Computer Hacker (credit: ilkaydede / iStock / GettyImages)
On January 30, the US Department of Justice announced that it had partnered with the Federal Bureau of Investigation and the Air Force Office of Special Investigations to engage in a campaign to 'map and further disrupt' a botnet tied to North Korean intelligence activities detailed in an indictment unsealed last September. Search warrants obtained by the FBI and AFOSI allowed the agencies to essentially join the botnet, creating servers that mimicked the beacons of the malware.
'While the Joanap botnet was identified years ago and can be defeated with antivirus software,' said United States Attorney Nick Hanna, 'we identified numerous unprotected computers that hosted the malware underlying the botnet. The search warrants and court orders announced today as part of our efforts to eradicate this botnet are just one of the many tools we will use to prevent cybercriminals from using botnets to stage damaging computer intrusions.”

Joanap is a remote access tool (RAT) identified as part of 'Hidden Cobra,' the Department of Homeland Security designator for the North Korean hacking operation also known as the Lazarus Group. The same group has been tied to the WannaCry worm and the hacking of Sony Motion Pictures. Joanap's spread dates back to 2009, when it was distributed by Brambul, a Server Message Block (SMB) file-sharing protocol worm. Joanap and Brambul were recovered from computers of the victims of the campaigns listed in the indictment of Park Jin Hyok in September.
Read 4 remaining paragraphs | Comments
https://arstechnica.com/?p=1448911
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Date Actuelle
ven. 22 nov. - 15:24 CET