FBI arrest Zombie pusher
Del.icio.us
Digg
Google
Spurl
Blink
Furl
Y! MyWeb
Share:
Sponsors:
The FBI has arrested a 20-year-old man from Los Angeles for profiting from adverts pushed to compromised computers on a zombie network.
Jeanson James Ancheta attacked computers to gain remote access in order to create a zombie network. He was then paid for installing adware on the network and sending spam through it.
He stands accused of conspiracy, attempted transmission of code to a protected computer, transmission of code to a government computer, accessing a protected computer to commit fraud and money laundering. If convicted of all counts, Ancheta could face a maximum term of 50 years in prison.
In a bid to expand his network, it appears Ancheta went an infection too far, and ended up compromising computers on the networks of the Weapons Division of the US Naval Air Warfare Center in China Lake, California and the US Department of Defense.
Ancheta was arrested when he was lured to FBI offices in order to pick up equipment seized in an earlier raid. He is thought to have made in the region of $60,000 from his activities with which he bought a new BMW and more computing equipment.
'Zombie botnets are a growing security problem as they pump out spam campaigns, steal information, or launch attacks against corporate networks,' said Graham Cluley, senior technology consultant for Sophos. 'In this case it appears they were being primarily used for displaying unwanted pop-up advertisements, filling the pockets of the hacker with cash.'
Article submitted by: Webshark
Last Update: 11-04-2005
Category: Security
Jeanson James Ancheta attacked computers to gain remote access in order to create a zombie network. He was then paid for installing adware on the network and sending spam through it.
He stands accused of conspiracy, attempted transmission of code to a protected computer, transmission of code to a government computer, accessing a protected computer to commit fraud and money laundering. If convicted of all counts, Ancheta could face a maximum term of 50 years in prison.
In a bid to expand his network, it appears Ancheta went an infection too far, and ended up compromising computers on the networks of the Weapons Division of the US Naval Air Warfare Center in China Lake, California and the US Department of Defense.
Ancheta was arrested when he was lured to FBI offices in order to pick up equipment seized in an earlier raid. He is thought to have made in the region of $60,000 from his activities with which he bought a new BMW and more computing equipment.
'Zombie botnets are a growing security problem as they pump out spam campaigns, steal information, or launch attacks against corporate networks,' said Graham Cluley, senior technology consultant for Sophos. 'In this case it appears they were being primarily used for displaying unwanted pop-up advertisements, filling the pockets of the hacker with cash.'
Article submitted by: Webshark
Last Update: 11-04-2005
Category: Security
Current rating: 5.25 by 39 users
Would you recommend this article to a friend? |
Not a Chance | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Absolutely |
Related News Stories
(9,407 reads) 07-05-2008
· Fusion Security(15,102 reads) 06-02-2007
· NukeSentinel(tm)2.5.10 Critical Update(13,856 reads) 05-07-2007
· NukeSentinel(tm) 2.5.08 Maintainance Release(15,330 reads) 03-15-2007
· NukeSentinel(tm) 2.5.07 Reissued: Critical Update(13,828 reads) 03-02-2007
· NukeSentinel(tm) 2.5.06: Critical Update(14,588 reads) 01-23-2007
· NukeSentinel(tm) 2.5.05 released(14,614 reads) 12-24-2006
· NukeSentinel 2.5.04 released(14,338 reads) 11-03-2006
· NukeSentinel(tm) 2.5.03 Released(18,177 reads) 10-19-2006
· Php Nuke 8.0 Patched(14,566 reads) 10-01-2006
· ipBan Modification
Please register or sign-in to post comments.