Hacking Network dismantled by Europol

Dismantled by Europol

Good news in the world of computer systems as the malware that has been embedded in machines since 2014 has been broken down. The case is the result of collaboration between a dozen countries: Ukraine, Canada, Lithuania, the Netherlands, Germany, the United Kingdom, the United States and France.


Facts details

Indeed, Europol or the European Criminal Police, in collaboration with Euro just or the European Union's Judicial Cooperation Department, removed the inconvenience caused by emote after a two-year operation. Europol is responsible for managing the investigations carried out by law enforcement agencies in the 10 countries that helped eliminate the malware. From now on, all infected computers will be redirected to an infrastructure controlled by Europol. Agents modify malware so that infected computers can pass through the servers they control. In addition, the German police stated that the IP addresses of infected computers are transmitted to the BSI (Nassir), which disinfects the devices. A system that is not yet available in France.


During the dismantling process, 17 servers in different countries such as Ukraine, Lithuania or the Netherlands were confiscated. The officers also confiscated computer equipment and money. They arrested two people responsible for the spread of malware and the proper functioning of the infrastructure. In view of the charges brought against them, they are sentenced to 12 years in prison.


Emotional demonstration

As a reminder, emotes is a very dangerous virus that spread to millions of computers through phishing emails. In the beginning, this malware took the form of banking software that can be used to steal banking information. These emails contained captured links and attachments in Word format, which intrigued captured internet users. The files were in the form of a press release on the health crisis, a package dispatch notification or an invoice. Hackers used the hijacking thread to insert old email conversations from malicious emails.


Once the emotes is installed, fishing and spam campaigns are created. The attackers of this malware sold the target computer systems to other cyber criminals. As a result, they cause other illegal activities such as ransom ware extortion or data theft. The cyber criminals hid under different identities: Ivan, Mealy bugs, Mummy Spider or TA542. Many are victims of this malware, including Bouygues Construction, the Ministry of the Interior, lawyers and judges from the Paris Court, not to mention many French organizations.


Aside from emotes, another malware has already been dismantled in the Trick bot botnet, which resells email access to other malicious groups. In relation to the Readopt affair, the French gendarmerie carried out this operation. She took control and modified the software on the infected computers. No arrests were made during this dismantling. This could cause the virus to reappear under a different name, as in the case of the Kolkhoz botnet.

Related Posts:

Leave a reply

Required fields are marked *

Login to Post Comment