Federal Agents Focus on Malicious Computer Code Used to Exploit SoCal Food Distributor

Federal law enforcement officials have successfully disrupted the infrastructure of the notorious Qakbot malware. Qakbot is a malicious computer code used by cybercriminals to carry out ransomware attacks, financial fraud, and other cyber-enabled crimes. These criminal activities have caused significant financial losses to businesses worldwide, including a food distribution company in Southern California.

As of last Friday, law enforcement authorities have gained access to the Qakbot botnet. They redirected the botnet traffic to servers controlled by law enforcement and instructed infected computers to download an “uninstall” file that freed them from the botnet’s control, according to the U.S. Department of Justice.

During a press conference in downtown Los Angeles, the DOJ also revealed that they have seized over $8.6 million in cryptocurrency obtained through illegal activities.

The takedown, referred to as “Operation Duck Hunt” by authorities, marks the largest U.S.-led disruption of a botnet infrastructure used by cybercriminals for cyber-enabled crimes. This operation involved collaborative efforts between the United States, France, Germany, the Netherlands, the United Kingdom, Romania, and Latvia.

“An international partnership led by the Justice Department and the FBI has successfully dismantled Qakbot, one of the most notorious botnets responsible for causing massive losses to victims worldwide,” stated U.S. Attorney Martin Estrada during the press conference.

“Qakbot was the preferred botnet for several infamous ransomware gangs, but we have now eradicated it. This operation has also resulted in the seizure of nearly $9 million in cryptocurrency belonging to the Qakbot cybercriminal organization, which will be returned to the victims. Our main focus is to protect the rights of victims, and this coordinated attack against computer-enabled crime showcases our dedication to safeguarding our nation.”

No further details were disclosed regarding the specific Southern California company affected by the malware.

Reference

Denial of responsibility! VigourTimes is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
Denial of responsibility! Vigour Times is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
DMCA compliant image

Leave a Comment