City
Epaper

US dismantles Russian botnet that hacked millions of devices

By IANS | Updated: June 21, 2022 10:45 IST

San Francisco, June 21 The US has dismantled the infrastructure of a Russian botnet which hacked millions of ...

Open in App

San Francisco, June 21 The US has dismantled the infrastructure of a Russian botnet which hacked millions of computers and other electronic devices around the world while working as a proxy service.

The US Department of Justice, together with law enforcement partners in Germany, the Netherlands and the UK, brought down a Russian botnet known as RSOCKS that initially targeted Internet of Things (IoT) devices and then expanded into compromising Android devices and conventional computers.

A botnet is a group of hacked internet-connected devices that are controlled as a group without the owner's knowledge and typically used for malicious purposes.

"The RSOCKS botnet compromised millions of devices throughout the world," said US Attorney Randy Grossman.

"Working with public and private partners around the globe, we will relentlessly pursue them while using all the tools at our disposal to disrupt their threats and prosecute those responsible," he said in a statement.

Rather than offer proxies that RSOCKS had leased, the botnet offered its clients access to IP addresses assigned to devices that had been hacked.

The cost for access to a pool of RSOCKS proxies ranged from $30 per day for access to 2,000 proxies to $200 per day for access to 90,000 proxies.

"This operation disrupted a highly sophisticated Russia-based cybercrime organisation that conducted cyber intrusions in the US and abroad," said FBI Special Agent in Charge, Stacey Moy.

Once purchased, the customer could download a list of IP addresses and ports associated with one or more of the botnet's backend servers.

The customer could then route malicious internet traffic through the compromised victim devices to mask or hide the true source of the traffic.

"It is believed that the users of this type of proxy service were conducting large scale attacks against authentication services, also known as credential stuffing, and anonymising themselves when accessing compromised social media accounts, or sending malicious email, such as phishing messages," the DoJ explained.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Stacey moyusSan FranciscoFBIUs Department Of JusticeSan francisco bayJose d'saRandy grossman
Open in App

Related Stories

InternationalSan Francisco Earthquake: 4.3 Magnitude Tremor Jolts Bay Area at 3 AM, No Tsunami Threat

International‘Act of Terror’ at FBI Pittsburgh Office: Manhunt Launched After Suspect Rams Car Into Gate and Flees

InternationalIndian-Origin Man Beheaded In US In Front Of Family After Violent Dispute

BusinessAnil Ambani’s Reliance Power and Reliance Infra Shares Zoom Even as Indian Markets Tumble Amid US Tariffs

InternationalMissouri House Blast: 5 Injured After Huge Explosion Damages 20 Homes in St Louis County

Technology Realted Stories

Technology91 online govt services restored after data centre fire in S. Korea

TechnologyDedicated team within ICAR to conduct sugarcane research: Shivraj Singh Chouhan

TechnologyClimate variability reshaping Indian Sardine's dynamics: Study

TechnologyMumbai's real estate market witnesses robust 1.11 lakh registrations between Jan-Sep

TechnologyAtmanirbharata is about building supply chains that can withstand global shocks: Piyush Goyal