A $ 3million reward on kingpin behind the GameOver Zeus botnet

The US Justice Department offers $3 million reward for the arrest of GameOver ZeuS kingpin. The botnet was involved in financial frauds on a large-scale.

The Justice Department has announced a reward of up to $3 million for the capture of the GameOver ZeuS botnet master. The malicious botnet was used by “a tightly knit gang of cybercriminals” who developed and used the Gameover ZeuS botnet to steal million online banking credentials from Microsoft Windows machines worldwide. Law enforcement sustains that the botnet infected more than 1 million machines worldwide stealing nearly $100 million. Despite law enforcement has dismantled the GameOver Zeus botnet, authorities are still searching for the kingpin. The criminal underground is very prolific, a few weeks after the operation run by law enforcement, cyber criminals built from scratch a new Gameover Zeus Botnet. The experts at Arbor networks discovered a new variant of GameOver Zeus Botnet which implement DGA scheme.

The US authorities are searching for Evgeniy Mikhailovich Bogachev, the man is accused of various charges related the  connection to the Gameover ZeuS botnet. The authorities said the botnet infected more than 1 million computers and resulted in $100 million in losses.

“But one significant part of the puzzle remains incomplete, as Bogachev remains at large.  Although we were able to significantly disrupt the Gameover Zeus and Cryptolocker criminal enterprise, we have not yet brought Bogachev himself to justice.” Assistant Attorney General Leslie Caldwell said.

A grand jury in Pittsburgh has unsealed a 14-count indictment against the Russian citizen Evgeniy Mikhailovich Bogachev charging him with conspiracy, wire fraud, computer hacking, bank fraud and money laundering in connection with his alleged role as an administrator of Gameover Zeus. Bogachev  is on the FBI’s most wanted cyber list.

Bogachev was also charged in another state for similar reasons, this time the malware used is Jabber Zeus, a prior variant of Zeus. Bogachev is considered by US authorities as the alleged leader of a cyber criminal gang based in Russia and Ukraine responsible for the development and operation of both the Gameover Zeus and Cryptolocker schemes.

The law enforcement believes that Bogachev is hidden in Russia, is on the FBI’s most wanted cyber list.

 

The GameOver Zeus botnet was involved in financial frauds, the malicious code is able to steal banking credentials from infected machines and that authorities also discovered that its infrastructure was also used to popular ransomware like CryptoLocker and Cryptowall.

Pierluigi Paganini

(Security Affairs –  GameOver Zeus botnet, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google: China dominates government exploitation of zero-day vulnerabilities in 2023

Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…

3 hours ago

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

15 hours ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

19 hours ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

1 day ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

1 day ago

Finnish police linked APT31 to the 2021 parliament attack

The Finnish Police attributed the attack against the parliament that occurred in March 2021 to…

1 day ago

This website uses cookies.