Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42942
  • Total Topics: 16142
  • Online Today: 4608
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Author Topic: Ramnit malware is destroyed by Europol ?! Download removal tool... W32.Ramnit  (Read 3366 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum


European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.

Ramnit started out in 2010 as a computer worm capable of infecting EXE, DLL, HTM, and HTML files. However, over time it evolved into an information-stealing Trojan that’s distributed in a variety of ways.

Ramnit is capable of hijacking online banking sessions, stealing session cookies which can then be used to access accounts on various sites, copying sensitive files from hard drives, giving attackers remote access to infected computers and more.

Researchers from antivirus vendor Symantec described the malware program as “a fully-featured cybercrime tool” in a blog post Wednesday and said that it infected over 3.2 million computers over its five years of existence: http://www.symantec.com/connect/blogs/ramnit-cybercrime-group-hit-major-law-enforcement-operation

Symantec, Microsoft and threat intelligence firm AnubisNetworks assisted Europol and law enforcement investigators from Germany, Italy, the Netherlands, and the U.K. in disrupting the cyberinfrastructure that was used to control the Ramnit botnet.

The operation involved the seizure of servers in four countries and the filing of a lawsuit last week in a U.S. federal court by Microsoft and the Financial Services Information Sharing and Analysis Center. Three hundred domain addresses used by the botnet’s operators have also been seized.

Law enforcement and the private sector need to work together to protect people online, said David Finn, associate general counsel and executive director of the Microsoft Cybercrime Center, in a blog post. “That’s because the complexity of fighting cybercrime is bigger than any one company or organization. It requires a diverse set of skills, including sophisticated computer forensics, big data analysis and legal strategy”: http://blogs.microsoft.com/on-the-issues/2015/02/25/europol-takes-down-servers-used-by-cybercriminals-to-steal-financial-data/

According to Symantec, the Ramnit botnet was still very active and consisted of around 350,000 compromised computers when the takedown operation was launched. The most affected countries are India with 27 percent of the victims, Indonesia with 18 percent and Vietnam with 12 percent. The U.S. is in fifth place, accounting for 6 percent of infected systems.

(PCW)

Symantec released a stand-alone tool that allows users to check their computers for Ramnit infections and clean them (download): http://www.symantec.com/security_response/writeup.jsp?docid=2015-022415-4725-99

Samker's Computer Forum - SCforum.info


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising