Toolkit helps cyberthief skim $3.2M off US gov't, others
By using various criminal toolkits, a Russia-based cybercriminal in his early 20s has managed to steal $3.2 million from major US corporations in six months, computer security firm Trend Micro said. Trend Micro said the attacker, identified only as "Soldier," uses criminal toolkits including SpyEye and ZeuS for crimeware, as well as exploit kits such as those for driving blackhat search engine optimization (SEO). "His botnet was able to compromise approximately 25,394 systems between April 19, 2011 and June 29, 2011. And while nearly all of the victims were located in the US, there were a handful of victims spread across another 90 countries," it said in a blog post. Using the SpyEye criminal toolkit, money mules and an accomplice believed to reside in Hollywood, “Soldier" went on his spree from January to July 2011, Trend Micro said. This was equivalent to getting some $533,000 a month, or $17,000 a day. Also, Trend Micro noted “Soldier" increased the number of successful infections achieved in the US by buying US traffic from other cybercriminals. "Besides using malware to steal money from the compromised accounts, he also steals user security credentials," it said. Large organizations, multinationals Trend Micro said a check of the victims' IP addresses recorded by the SpyEye command and control server showed they belonged to large organizations and US multi-nationals in a variety of sectors. It said the victims included:
- US Government (Local, State Federal)
- US Military
- Educational & Research Institutions
- Banks
- Airports
- Other Companies (Automobile, Media, Technology)
- C&C Infrastructure