Servers around the world were seized - but criminals will soon adapt, the NCA warns
People have "two weeks" to protect themselves from a "powerful computer attack", the UK's National Crime Agency (NCA) has warned.
Users are being told to take "immediate" action to protect their computers after US authorities seized a major criminal network.
The FBI, working with the NCA, has taken control of a botnet used to steal personal and financial data.
More than 15,000 machines in the UK are thought to have been infected to date.
Internet service providers (ISPs) will be contacting customers known to have been affected by either letter or email. The first notices were sent out on Monday, the BBC understands.
The action related to a strain of malware - meaning malicious software - known as Gameover Zeus. Its alternative names include GOZeus and P2PZeus.
Hi-tech crime terms- Bot - one of the individual computers in a botnet; bots are also called drones or zombies
- Botnet - a network of hijacked home computers, typically controlled by a criminal gang
- Malware - an abbreviation for malicious software ie a virus, Trojan or worm that infects a PC
- Ransomware - like malware, but once in control it demands a fee to unclock a PC
Malware is typically downloaded by unsuspecting users via what is known as a phishing attack, usually in the form of an email that looks like it comes from somewhere legitimate - such as a bank - when it fact it is designed to trick a person into downloading malicious software.
Once installed on a victim's machine, Gameover Zeus will search specifically for files containing financial information.
If it cannot find anything it deems of worth, some strains of Gameover Zeus will then install Cryptolocker - a ransomware program that locks a person's machine until a fee is paid.
Global action
In what has been described as the biggest ever operation of its kind, servers all over the world were raided simultaneously by the authorities.
"The scale of this operation is unprecedented," said Steve Rawlinson from Tagadab, a web hosting company involved in the take-down effort.
"This is the first time we've seen a co-ordinated, international approach of this magnitude, demonstrating how seriously the FBI takes this current threat."
The action meant the authorities could direct what are known as Command and Control (C&C) servers - the machines that control the operation of the botnet.
With the C&C servers under police control, criminals should temporarily be unable to manage the computers they hijacked - but only until they are able to set-up new C&C servers elsewhere.
All computer users are being urged to make sure that the malware has not infected their machines.
"This warning is not intended to cause you panic but we cannot over-stress the importance of taking these steps immediately," said UK-based Get Safe Online, a government-backed organisation that has published a list of software it recommends for the task.
"This is because the UK's NCA has taken temporary control of the communications used to connect with infected computers, but expects only a very limited window of opportunity to ensure you are protected."
Technical problems caused some users to become unable access the Get Safe Online website on Monday afternoon. The organisation's chief executive Tony Neate said this was not due to high traffic or a cyber-attack, and added that the cause was being investigated.
More detailed information on the threat was published by the US Computer Emergency Readiness Team (Cert).
'Quarantined computers'
Following a slew of high-profile hack attacks in recent weeks - including eBay, Spotify and shoe retailer Office - security expert Rik Ferguson raised concerns that computer users might be suffering from "notification fatigue".
However, he stressed that this operation was more targeted, and should not be ignored.
"I think one of the things that is really critical with this operation is that if people are infected, it's going to be completely invisible to them," the Trend Micro security researcher said.
"One of the strengths of this operation is not only that it involved organisations around the world, but that it involved the ISPs as well.
"The ISPs will go out and proactively notify any of their customers who are infected."
He suggested that machines known to be infected by serious malware should be placed in a quarantined environment until the threat was removed.
"Making it uncomfortable, if not impossible, to use the internet if PC if it is a danger is one of the most effective ways to do that," he said.
0 comments:
Post a Comment