Botnet taken down as ringleaders are arrested

Posted by   Virus Bulletin on   Mar 3, 2010

'Mariposa' included almost 13 million zombies.

Spanish authorities have managed to take down the Mariposa botnet - one of the largest of its kind which is believed to have infected in 12.7 million computers worldwide - as well as arresting three of its botherders.

Stories of botnets being taken down have become more prevalent recently; however, usually this is by means of taking the command and control centres down - which leaves the computers infected and the crooks behind the botnet free to regain control over their network of zombies. By arresting the botherders themselves, one would hope that Mariposa has been given a more serious blow.

While the botnet was used for a wide range of malicious activities, from identity theft to running DDoS attacks and sending spam, first reports suggest that global spam levels have dropped over the past fews days.

The Guardia Civil, the Spanish national police, has revealed that the three suspects are in their 20s or early 30s. According to a spokesman, they are neither brilliant programmers nor mafiosi who like fast cars and expensive clothes: "The most frightening thing is they are normal people who are earning a lot of money with cybercrime". More arrests are expected in other countries.

More at Associated Press here, or at Panda Security here. Panda, together with Canadian company Defence Intelligence assisted the police in their investigations.

Posted on 03 March 2010 by Virus Bulletin



Latest posts:

The Virus Bulletin conference returns home: VB2019 to take place in London

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Guest blog: The case for increasing transparency in cybersecurity

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

VB2018 preview: Workshops

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

New article: Through the looking glass: webcam interception and protection in kernel mode

Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a…

VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)

In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.