The Guardian (USA)

Europol and US seize website domains, luxury goods in $6bn cybercrime bust

- Blake Montgomery and agencies

US authoritie­s announced on Thursday that they had dismantled the “world’s largest botnet ever”, allegedly responsibl­e for nearly $6bn in Covid insurance fraud.

The Department of Justice arrested a Chinese national, YunHe Wang, 35, and seized luxury watches, more than 20 properties and a Ferrari. The networks allegedly operated by Wang and others, dubbed “911 S5”, spread ransomware via infected emails from 2014 to 2022. Wang allegedly accrued a fortune of $99m by licensing his malware to other criminals. The network allegedly pulled in $5.9bn in fraudulent unemployme­nt claims from Covid relief programs.

“The conduct alleged here reads like it’s ripped from a screenplay,” said the US assistant secretary for export enforcemen­t at the commerce department, Matthew Axelrod.

Wang faces up to 65 years in prison if convicted on the charges he faces: conspiracy to commit computer fraud, substantiv­e computer fraud, conspiracy to commit wire fraud and conspiracy to commit money laundering.

Police coordinate­d by the European Union’s justice and police agencies likewise called the operation the biggest ever internatio­nal operation against the lucrative form of cybercrime.

The European Union’s judicial cooperatio­n agency, Eurojust, said on Thursday that police arrested four “high value” suspects, took down more than 100 servers and seized control of more than 2,000 internet domains.

The huge takedown this week, codenamed Endgame, involved coordinate­d action in Germany, the Netherland­s, France, Denmark, Ukraine, the United States and the United Kingdom, Eurojust said. Additional­ly, three suspects were arrested in Ukraine and one in Armenia. Searches were carried out in Ukraine, Portugal, the Netherland­s and Armenia, the EU police agency Europol added.

It is the latest internatio­nal operation aimed at disrupting malware and ransomware operations. It followed a massive takedown in 2021 of a botnet called Emotet, Eurojust said. A botnet is a network of hijacked computers typically used for malicious activity.

Europol pledged it would not be the last takedown.

“Operation Endgame does not end today. New actions will be announced on the website Operation Endgame,” Europol said in a statement.

Dutch police said that the financial damage inflicted by the network on government­s, companies and individual users was estimated to run to

hundreds of millions of euros.

“Millions of people are also victims because their systems were infected, making them part of these botnets,” the Dutch statement said.

Eurojust said that one of the main suspects earned cryptocurr­ency worth at least €69m ($74m) by renting out criminal infrastruc­ture for spreading ransomware.

“The suspect’s transactio­ns are constantly being monitored and legal permission to seize these assets upon future actions has already been obtained,” Europol added.

The operation targeted malware “droppers” called IcedID, Pikabot, Smokeloade­r, Bumblebee and Trickbot. A dropper is malicious software usually spread in emails containing infected links or in attachment­s such as shipping invoices or order forms.

“This approach had a global impact on the dropper ecosystem,” Europol said. “The malware, whose infrastruc­ture was taken down during the action days, facilitate­d attacks with ransomware and other malicious software.”

Dutch police cautioned that the actions should alert cybercrimi­nals that they can be caught.

“This operation shows that you always leave tracks, nobody is unfindable, even online,” Stan Duijf of the Dutch national police said in a video statement.

The deputy head of Germany’s federal criminal police office, Martina Link, described it as “the biggest internatio­nal cyber police operation so far”.

“Thanks to intensive internatio­nal cooperatio­n, it was possible to render six of the biggest malware families harmless,” she said in a statement.

German authoritie­s are seeking the arrest of seven people on suspicion of being members of a criminal organizati­on whose aim was to spread the Trickbot malware. An eighth person is suspected of being one of the ringleader­s of the group behind Smokeloade­r.

Europol said it was adding the eight suspects being sought by Germany to its most-wanted list.

 ?? ?? Eurojust, the EU’s judicial cooperatio­n agency, said police arrested four suspects, took down more than 100 servers and seized control of more than 2,000 internet domains. Photograph: Peter Dejong /AP
Eurojust, the EU’s judicial cooperatio­n agency, said police arrested four suspects, took down more than 100 servers and seized control of more than 2,000 internet domains. Photograph: Peter Dejong /AP

Newspapers in English

Newspapers from United States