Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
FBI launches digital sting of malware botnet
Thursday - 4/14/2011, 8:30am EDT
Investigators seized five major computer servers that were controlling hundreds of thousands of infected computers, and seized 29 domain names used by the botnet to communicate with those servers. Describing the operation, FBI officials said they essentially broke the link between the cyber thieves and the infected computers. When the malware sent a message back to the Coreflood control sites asking what to do with all the data it had gathered from a computer, investigators responded with their own message: Send nothing. Shut down.
This is reportedly the first case in the U.S. where authorities have swapped out criminal servers for government servers to track down the culprits. It's also the biggest enforcement action authorities have ever taken against cyber criminals.
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.