- Operation: Bot Roast
-
Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners’ knowledge, which turns the computer into a zombie computer that then sends out spam to other computers from the compromised computer, making a botnet or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to national security.[1]
Contents
The results
The operation was created to disrupt and disassemble bot herders. In June 2007, the FBI had identified about 1 million computers that were compromised, leading to the arrest of the persons responsible for creating the malware. In the process, owners of infected computers were notified, many of whom were unaware of the exploitation.[1][2]
Some early results of the operation include charges against the following:
- Robert Alan Soloway of Seattle, Washington, pleaded guilty to charges of using botnets to send tens of millions of spam messages touting his website.[1]
- James C. Brewer, (pseudonym "Sint3k"), of Arlington, Texas, is accused of infecting tens of thousands of computers worldwide, including some at Chicago-area hospitals.[1]
- Jeanson James Ancheta plead guilty to controlling thousands of infected computers.[3]
- Jason Michael Downey (pseudonym "Nessun"), founder of the IRC network Rizon, is charged with using botnets to disable other systems.[1]
- Akbot author Owen Walker (pseudonym "AKILL") of New Zealand, was tried for various crimes and discharged by the prosecution in 2008.[4]
- Ryan Goldstein of Ambler, Pennsylvania, pleaded guilty to aiding and abetting another person to gain unauthorized access to a protected computer with accomplice Owen Walker.[5]
See also
References
- ^ a b c d e "OPERATION: BOT ROAST ‘Bot-herders’ Charged as Part of Initiative" (Press release). Federal Bureau of Investigation. 2007-06-13. http://www.fbi.gov/page2/june07/botnet061307.htm. Retrieved 2007-06-20.
- ^ "FBI tries to fight zombie hordes" (Press release). BBC News. 2007-06-14. http://news.bbc.co.uk/2/hi/technology/6752853.stm. Retrieved 2007-06-20.
- ^ Dan Goodin (13 June 2007). "FBI logs its millionth zombie address". the register. http://www.theregister.co.uk/2007/06/13/millionth_botnet_address/. Retrieved 2008-09-26.
- ^ Akill pleads guilty to all charges, By Ulrika Hedquist, 1 April, 2008, Computerworld
- ^ Engineering junior indicted on federal computer hacking charges[dead link]
External links
- OnGuardOnline.gov - Botnets and Hackers and Spam (Oh, My!) OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information.
- United States Computer Emergency Readiness Team ST06-001-Understanding Hidden Threats: Rootkits and Botnets
Malware Infectious malware Concealment Malware for profit Privacy-invasive software · Adware · Spyware · Botnet · Keystroke logging · Web threats · Fraudulent dialer · Malbot · Scareware · Rogue security software · RansomwareBy operating system Protection Countermeasures Botnets Notable botnets Main articles Categories:- Computer network security
- Computer security exploits
- Software distribution
- Malware
- Botnets
- FBI operations
- Law enforcement operations in the United States
Wikimedia Foundation. 2010.