I Read It On The Internet

US Destroyed Russian Botnet That Hacked Millions Of Computers, Electronic Devices

The United States has destroyed the infrastructure of a Russian botnet that hacked millions of computers and other electronic devices worldwide while acting as a proxy service.

This article was written by Brendan Taylor and originally published by Insider Paper.

The US Department of Justice, in collaboration with law enforcement partners in Germany, the Netherlands, and the United Kingdom, brought down the RSOCKS botnet, which initially targeted Internet of Things (IoT) devices before spreading to compromise Android devices and traditional computers.

A botnet is a collection of hacked internet-connected devices that are controlled collectively without the owner’s knowledge and are typically used for malicious purposes.

“The RSOCKS botnet compromised millions of devices throughout the world,” said US Attorney Randy Grossman.

“Working with public and private partners around the globe, we will relentlessly pursue them while using all the tools at our disposal to disrupt their threats and prosecute those responsible,” he said in a statement.

Rather than providing proxies that RSOCKS had leased, the botnet provided its clients with access to IP addresses assigned to hacked devices.

The cost of using a pool of RSOCKS proxies ranged from $30 per day for 2,000 proxies to $200 per day for 90,000 proxies.

“This operation disrupted a highly sophisticated Russia-based cybercrime organization that conducted cyber intrusions in the US and abroad,” said FBI Special Agent in Charge, Stacey Moy.

After purchasing the botnet, the customer could obtain a list of IP addresses and ports associated with one or more of the botnet’s backend servers.

The customer could then route malicious internet traffic through the compromised victim devices, masking or concealing the true source of the traffic.

“It is believed that the users of this type of proxy service were conducting large scale attacks against authentication services, also known as credential stuffing, and anonymizing themselves when accessing compromised social media accounts, or sending malicious email, such as phishing messages,” the DoJ explained.

Share
U Cast Studios

Recent Posts

  • News

Vietnam’s Political Turmoil Reveals A Turn Towards China – And Away From The West

In just a few weeks, the Communist Party of Vietnam (CPV) has shredded its reputation… Read More

1 day ago
  • Business

The Sudden Death Of The American Condo

Condos are disappearing. They persist now mainly in pre-2010 buildings. Among multifamily homes built in… Read More

2 days ago
  • Lifestyle

Mapped: Life Expectancy By Region (1950-2050)

Average life expectancy at birth is projected to surpass 80 years in most global regions by 2050,… Read More

2 days ago
  • I Read It On The Internet

What Are Your Rights If You’re Hit By A Driverless Car?

With technology advancing at such a rapid pace, driverless cars have shifted from science fiction… Read More

3 days ago
  • Lifestyle

How Childhood Trauma Affects Adults Later

Some people assume we forget or outgrow trauma. But the truth is, if someone experiences… Read More

3 days ago
  • LA/Ventura

Oracle Moving Headquarters Out Of Austin Only 4 Years After Moving Out Of California

Oracle CEO Larry Ellison announced earlier this week that he would be moving Oracle from… Read More

4 days ago

This website uses cookies.