[Infowarrior] - The Evil (Cyber) Empire
Richard Forno
rforno at infowarrior.org
Thu Dec 31 17:40:23 UTC 2009
The Evil (Cyber) Empire
Inside the world of Russian hackers.
By Yulia Taratuta, Igor Ivanov, Svetlana Zaitseva, and Mikhail Zygar |
Russky Newsweek
http://www.newsweek.com/id/228674/output/print
Did Russian hackers manage to steal tens of millions of dollars from
Citigroup? While The Wall Street Journal reports that the FBI is
investigating the alleged loss, the financial organization denies
losing money in such a security breach. It may take awhile to uncover
the truth, but reports of the attack have cast yet another spotlight
into the shadowy world of cybercrime. This report, adapted from a
cover package by NEWSWEEK's Russia-language partner,Russky Newsweek,
takes a closer look at those behind this global threat. (Click here
for a look at the world's top 10 spammers).
The assaults may seem to be political. In 2007, a cyberattack on
Estonia, home of the popular Internet phone company Skype, paralyzed
the country's entire government. Then, when the Russia-Georgia
conflict flared in 2008, software suddenly became available to anyone
wanting to wage their own personal cyberwar on the Georgian capital of
Tbilisi. And later that year, Lithuania too became a cyber-victim when
it vetoed negotiations between Russia and the European Union. Indeed,
NATO takes the threat of cyber-warfare so seriously that it signed off
on a special report on the topic during its parliamentary assembly
last October. "Although there is no conclusive evidence that the
cyberattacks in Georgia were executed or sanctioned by the Russian
government," the NATO report notes, "there is no evidence that it
tried to stop them, either."
Russian lawmaker Nikolai Kovalyov angrily dismisses these allegations
as propaganda from the Cold-War era. "The report does not contain a
single piece of evidence of the mythical Russian cyberthreat or a
Russian trail from the cross-border cyberattacks," he says. Still,
NATO has little doubt that—official or no—the attacks have a common
Russian thread: the Russian Business Network (RBN), a shadowy
cyberstructure that is reported to have sold hacking tools and
software for accessing U.S. government systems. According to the NATO
investigators, however, political subversion is little more than a
sideline for these hackers. Their real goal: stealing money through
scams, spam, and infiltrating the networks of Western banks.
Reportedly started by someone operating under the name "Flyman," RBN
is known as the mother of cybercrime among online investigators.
François Paget, senior expert for the McAfee company, says that RBN
began as an Internet provider and offered "impenetrable" hosting for
$600 a month. This meant a guarantee that it would not give out
information about its clients, no matter what business they were in.
Aleksandr Gostev, director of Kaspersky Labs, a global research and
threat analysis center, believes that RBN's servers are located in
Panama. "Confidential data about clients can be obtained only by a
court decision," a Newsweek source familiar with the situation says.
"But what court do you apply to if criminal ties are discovered? A
Panamanian court?"
Paget says that RBN was once known as the most active criminal group
in the virtual world. Crime researchers are uncertain as to whether
RBN itself was a real organization or whether it just offered a
virtual home to cybergangs. According to one study, the network
comprised 406 addresses and 2090 domain names by the end of 2007. That
same year, the group—hounded both by Russian and American law-
enforcement agencies—seemed to disappear. That, however, may have been
an illusion. RBN may have vanished, but the host organization gave
birth to multiple evil offspring operated by Russian expats and
deployed on servers in China, Turkey, Ukraine, and the United States.
"The world got about 10 RBNs," says Gostev.
The original RBN was behind the cyberattack on Estonia, Paget says,
and, according to a study by the U.S. Cyber Consequences Unit (US—
CCU), one of its successors was behind the virtual assault on Georgia.
RBN's real money, though, is believed to come from sources that
include spam, child porn, online casinos, and phishing scams to steal
bank passwords and card numbers. One of RBN's most prosperous
businesses is Internet pharmacies, with the international organization
Spamhaus naming Canadian Pharmacy as the main propagator of criminal
cyberschemes. Sources in the market say that this is a drug-selling
network comprising several dozen virtual pharmacies making sales,
mostly to the U.S. The name of the main Web site to which the
pharmacies relay their orders—glavmed.com—is distinctly Russian; the
illegally-copied medications are said to be made in India. Those who
order from these sites are likely to have their e-mail addresses
harvested and sold to spammers, who then inundate them with offers for
everything ranging from pharmaceuticals to porn. According to Dmitry
Golubov, who describes himself as the leader of the Internet Party of
Ukraine, a group of 20 to 25 people account for 70 percent of the
world's spam. "A database of active e-mails costs money," says
Golubov. "For example, a million addresses of purchasers of access to
porn resources costs $25,000 to $30,000."
Golubov prefers not to discuss his own Internet profits, although he
too is said to have been part of RBN. The McAfee company calls him the
No. 1 carder—hackers who steal from bank cards—in the world. In a
conversation with Russky Newsweek, however, Dmitry Golubov denied
everything. "On September 29, 2009, the Solomensky District court in
Kiev dropped the criminal case against me for lack of corpus delicti,"
he says, adding that he is not aware that he is in trouble with the
law outside Ukraine.
Like the original RBN, many of its spinoffs are under scrutiny. The
company Hoster McColo, registered in California, was pushed offline
following a petition by the U.S. Federal Trade Commission (FTC) citing
it for spam and what is known as distributed denial of service
attacks. (The company's founder, racer Nikolai McColo, was killed when
he crashed into a metal pillar during one of his high-speed nighttime
drives in Moscow in 2007.) Another RBN affiliate, the Atrivo company,
had its license revoked and was disconnected from the Internet on a
charge of disseminating porn and viruses and theft of information.
EstDomains, an Estonian subsidiary of the "mother of cyberterrorism,"
suffered a similar disconnect at the FTC's initiative, when the host
3FN, a Russian-language service created by a native of Latvia, was
forced out of operation. And last January the company Ukrtelegrup,
another mainstay of cybercrime, bit the dust. It had been accused of
creating a program that made it possible to steal users' personal
information, including financial data.
The hacker community, however, doesn't believe that RBN is dead.
"RBN's cause is alive even now," one authoritative member insists.
Certainly, the cause counts for more than the location. After the
attack on Estonia, Russian lawmaker Kovalyov noted angrily that 60
percent of the disruptive traffic came from the United States and 30
percent from China. Only 10 percent came from Russia, he said. That
Estonia was attacked primarily from American territory hardly means
that the culprits were on American soil. In effect, hackers can
operate virtually from anywhere in the world. Via viruses, hackers
create "botnets" that utilize zombie PCs in foreign lands to send out
spam, or, say, launch a cyberattack. In other words, unsuspecting
users become the source of the malicious traffic—and physical distance
no longer offers any protection against crime or political subversion.
Translated from the Russian by Steven Shabad
Find this article at http://www.newsweek.com/id/228674
© 2009
More information about the Infowarrior
mailing list