Russian Business Network leaves Russia

Posted by   Virus Bulletin on   Nov 9, 2007

Leading cybercrime hosting hub moves business to fresh pastures.

The notorious Russian Business Network (RBN), recently making headlines for the massive amounts of malicious and criminal content passing through its servers, has suddenly shut up shop in its St. Petersburg base and apparently moved its services to other countries.

A Trend Micro blogger, writing earlier this week (here), described the sudden shutdown as making the web 'a somewhat safer place', going on to express doubt that the crooks behind the malware, money laundering and child porn hosting system would stay quiet for long.

More investigation has indicated that many of the operations formerly hosted on the RBN servers are now coming out of China, with Turkey and Taiwan also reported to be hosting similar content. Some security watchers have suggested that the shutdown may have been imposed by upstream service providers removing connections to the so-called 'bulletproof hosting' service, and that criminal customers have taken their business elsewhere.

With the RBN thought to be closely linked to the 'Storm Worm' attack, others have speculated that the move may have been planned as part of another stage of evolution from one of the biggest and most serious threats for some time.

A detailed look at the RBN migration, with comment from several Trend experts, is in eWeek here. More commentary and analysis is on the Washington Post security blog here.

Posted on 09 November 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 conference programme announced

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.

VB2018 paper: Under the hood - the automotive challenge

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the…

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that…

VB2019 call for papers closes this weekend

The call for papers for VB2019 closes on 17 March, and while we've already received many great submissions, we still want more!

Registration open for VB2019 ─ book your ticket now!

Registration for VB2019, the 29th Virus Bulletin International Conference, is now open, with an early bird rate available until 1 July.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.