www.cyberscoop.com Open in urlscan Pro
18.64.103.11  Public Scan

URL: https://www.cyberscoop.com/dojs-sandworm-operation-raises-questions-about-how-far-the-feds-can-go-to-disarm-botnets/
Submission: On April 14 via api from IN — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.cyberscoop.com/

<form role="search" class="overlay-search-form" method="get" id="searchform" action="https://www.cyberscoop.com/">
  <div><label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" value="" name="s" id="s" placeholder="Type to search" class="overlay-search-input">
  </div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2153467/20762415-8082-48f0-b243-36443c93d852

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2153467/20762415-8082-48f0-b243-36443c93d852" enctype="multipart/form-data" id="hsForm_20762415-8082-48f0-b243-36443c93d852"
  method="POST" class="hs-form stacked hs-custom-style hs-form-private hsForm_20762415-8082-48f0-b243-36443c93d852 hs-form-20762415-8082-48f0-b243-36443c93d852 hs-form-20762415-8082-48f0-b243-36443c93d852_f7cd8794-ae05-444a-95d1-dfb533d2b692"
  data-form-id="20762415-8082-48f0-b243-36443c93d852" data-portal-id="2153467" target="target_iframe_20762415-8082-48f0-b243-36443c93d852" data-reactid=".hbspt-forms-0">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-20762415-8082-48f0-b243-36443c93d852" class="" placeholder="Enter your " for="email-20762415-8082-48f0-b243-36443c93d852"
      data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0"></span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-20762415-8082-48f0-b243-36443c93d852" class="hs-input" type="email" name="email" required="" placeholder="Email (required)*" value="" autocomplete="email"
        data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
  </div>
  <div class="hs_subscriber hs-subscriber hs-fieldtype-checkbox field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$1"><label id="label-subscriber-20762415-8082-48f0-b243-36443c93d852" class=""
      placeholder="Enter your Subscriber" for="subscriber-20762415-8082-48f0-b243-36443c93d852" data-reactid=".hbspt-forms-0.1:$1.0"><span data-reactid=".hbspt-forms-0.1:$1.0.0">Subscriber</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$1.$subscriber"><input name="subscriber" class="hs-input" type="hidden" value="CyberScoop" data-reactid=".hbspt-forms-0.1:$1.$subscriber.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.2"></noscript>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="GET THE SCOOP" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:664.0999984741211,&quot;rumServiceResponseTime&quot;:1531.6999969482422,&quot;rumFormRenderTime&quot;:5.799995422363281,&quot;rumTotalRenderTime&quot;:1538.8999938964844,&quot;rumTotalRequestTime&quot;:864.9000015258789,&quot;lang&quot;:&quot;en&quot;,&quot;embedAtTimestamp&quot;:&quot;1649941998741&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1586164072742&quot;,&quot;pageUrl&quot;:&quot;https://www.cyberscoop.com/dojs-sandworm-operation-raises-questions-about-how-far-the-feds-can-go-to-disarm-botnets/&quot;,&quot;pageTitle&quot;:&quot;DOJ's Sandworm operation raises questions about how far feds can go to disarm botnets - CyberScoop&quot;,&quot;source&quot;:&quot;FormsNext-static-5.478&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.478&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;478&quot;,&quot;timestamp&quot;:1649941998749,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2153467&quot;,&quot;formId&quot;:&quot;20762415-8082-48f0-b243-36443c93d852&quot;,&quot;target&quot;:&quot;#hbspt-form-1649941997563-1967655347&quot;},&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;formTarget&quot;:&quot;#hbspt-form-1649941997563-1967655347&quot;,&quot;correlationId&quot;:&quot;93624d15-4dac-4cae-b225-a4f3b60c50f3&quot;,&quot;hutk&quot;:&quot;29a4870b016b3bb85d6877545c114a7e&quot;,&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_20762415-8082-48f0-b243-36443c93d852" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

<form autocomplete="off" role="search" class="jetpack-instant-search__search-results-search-form">
  <div class="jetpack-instant-search__search-form">
    <div class="jetpack-instant-search__box"><label class="jetpack-instant-search__box-label" for="jetpack-instant-search__box-input-1">
        <div class="jetpack-instant-search__box-gridicon"><svg class="gridicon gridicons-search " focusable="true" height="24" viewBox="0 0 24 24" width="24" xmlns="http://www.w3.org/2000/svg" aria-hidden="false" style="height: 24px; width: 24px;">
            <title>Magnifying Glass</title>
            <g>
              <path d="M21 19l-5.154-5.154C16.574 12.742 17 11.42 17 10c0-3.866-3.134-7-7-7s-7 3.134-7 7 3.134 7 7 7c1.42 0 2.742-.426 3.846-1.154L19 21l2-2zM5 10c0-2.757 2.243-5 5-5s5 2.243 5 5-2.243 5-5 5-5-2.243-5-5z"></path>
            </g>
          </svg></div><input autocomplete="off" id="jetpack-instant-search__box-input-1" class="search-field jetpack-instant-search__box-input" inputmode="search" placeholder="Search…" type="search"><button
          class="screen-reader-text assistive-text">Search</button>
      </label></div>
  </div>
</form>

Text Content

Close Ad


Continue to CyberScoop.com
Subscribe About RSS
Brought to you by


 * Ukraine
 * Threats
 * Policy
 * Privacy
 * Technology
 * Workforce
 * Money
 * Special Reports
 * Watch
 * Listen
 * Events
   * Upcoming Events
   * On-demand Events
   * Past Events
 * Insights

threats


DOJ'S SANDWORM OPERATION RAISES QUESTIONS ABOUT HOW FAR FEDS CAN GO TO DISARM
BOTNETS


FBI Director Christopher Wray speaks during a press conference at the U.S.
Justice Department on April 6, 2022, announcing the Sandworm operation. (Photo
by Anna Moneymaker/Getty Images)


SHARE




WRITTEN BY

Suzanne Smalley

Apr 8, 2022 | CyberScoop

Written by Suzanne Smalley
Apr 8, 2022 | CYBERSCOOP

The notion that citizens are protected from unreasonable search and seizure is a
bedrock legal principle: A court must issue a search warrant before police can
enter a private home and ransack it looking for evidence. 

In what former prosecutors and legal experts call a landmark operation, the
Department of Justice has now tested that principle to disrupt a Russian botnet
that was spreading malware on a far-flung network of computers. Using so-called
remote access techniques, law enforcement effectively broke into infected
devices from afar to destroy what the U.S. government calls the “Cyclops Blink”
botnet — and did so without the owners’ permission.

While the search warrant publicized by DOJ makes clear that this access did not
allow the FBI to “search, view, or retrieve a victim device owner’s content or
data,” legal experts say the case does raise questions about how far the
government’s power should extend under a federal criminal procedure provision
known as Rule 41.

The Kremlin-backed hackers responsible for the botnet — a group known to
cybersecurity researchers as Sandworm — exploited a vulnerability in WatchGuard
Technologies firewall devices to install malware on a network of compromised
devices. By leveraging physical access to a subset of infected devices, the FBI
said it was able to reverse engineer its way into accessing all of the botnet’s
command and control devices. 

The government’s use of a search warrant to gain such remote access to
individual computers without notice to the owners relied on a 2016 amendment to
Rule 41, a federal rule of criminal procedure. The culmination of a three-year
deliberation process which included written comments and public testimony before
the federal judiciary’s Advisory Committee on the Federal Rules of Criminal
Procedure — a committee which includes judges, law professors, and attorneys in
private practice — the 2016 amendment was ultimately adopted by the Supreme
Court and approved by Congress.

While the amended rule has been used previously, legal experts say this case
appears to be the most sweeping and high-profile application of the rule to date
and is a notable example of federal prosecutors using it not just to investigate
criminal activity but to disrupt it.


‘DE FACTO CYBERSECURITY REGULATORS’

The 2016 change was designed to help the government more easily battle botnets
and to support cybercrime investigations in situations like this one where the
criminals’ locations are unknown, according to Scott Shackelford, a law
professor and the director of the Ostrom Workshop Program on Cybersecurity and
Internet Governance at Indiana University.

Shackelford said the revision to Rule 41 allows the FBI to access computers
outside the jurisdiction of the court which issued the search warrant.

“This action highlights the precedent, and power, of courts becoming de facto
cybersecurity regulators that can empower the Department of Justice to clean up
large-scale deployments of malicious code,” Shackelford said via email.

Important and unresolved legal issues are embedded in this case, he said. For
instance, he said, society will need to determine how to “balance private
property rights against national security needs in cases like this.”

“Under this authority the FBI could hack into computers at will, and without the
need for a specific search warrant,” Shackelford said. To date, there are no
known examples of the the government using the amended Rule 41 to break into
remote computers without a search warrant, but in this case the search warrant
the government obtained was used in multiple jurisdictions outside of the one
which issued the warrant.

Shackelford added that he is “concerned about the precedent that this sets, both
in the U.S., but also globally as other law enforcement agencies around the
world might well mirror — and even go further — than what the FBI has done to
date.”

The Department of Justice and FBI did answer emails seeking comment by press
time.

In a press release announcing the operation, Assistant Attorney General Matthew
Olsen of the Justice Department’s National Security Division said the
“court-authorized removal of malware deployed by the Russian GRU demonstrates
the department’s commitment to disrupt nation-state hacking using all of the
legal tools at our disposal.” 

> “Under this authority the FBI could hack into computers at will, and without
> the need for a specific search warrant.”
> 
> — Scott Shackelford, law professor, Indiana University

The Department of Justice’s actions to disrupt Cyclops Blink are also emblematic
of the federal government’s increasing collaboration with the private sector to
achieve dramatic results in a short period of time, according to Mark Bini, a
lawyer at the firm Reed Smith who previously worked on cybercrime as a federal
prosecutor.

“It is particularly interesting that this news comes out at the same time as
Microsoft announcing, related to a separate incident, that it had taken control
of and taken down seven internet domains linked to a Russian state sponsored
hacking group,” Bini said via email. “All of this underscores how important the
private sector will be with respect to the United States’ cyber defense, and
suggests that we will see the Department of Justice working collaboratively with
the private sector to turbo-charge its efforts to combat state-sponsored
cyber-attacks.”


HOW MUCH IS TOO MUCH?

There is some debate in legal circles around how far law enforcement can go when
using remote access technology and how appropriate it is to leverage the tool to
disrupt cybercrimes as opposed to investigate them, according to Christopher
Painter, a former federal prosecutor who prosecuted several high-profile
cybercrimes before becoming the top cyber diplomat at the State Department.

The case “reflects an overall change over the last 10 years at the Justice
Department to not just focus on putting handcuffs on people, which is an
important part of their job, but also to disrupt criminal activity,” Painter
said.  

The Justice Department announced a similar case last April, when the agency
publicized what it said in a press release was a “court-authorized operation to
copy and remove malicious web shells from hundreds of vulnerable computers in
the United States.” Hackers in that case exploited zero-day vulnerabilities in
Microsoft Exchange Server software to implant code that could enable remote
administration and allow continued access. Microsoft alleged that a
state-sponsored cyber-espionage group based in China — which it called Hafnium —
was responsible.

In that operation, the Department of Justice said the FBI disrupted the attack
“by issuing a command through the web shell to the server, which was designed to
cause the server to delete only the web shell (identified by its unique file
path).”

Shoba Pillay, a former federal cybercrimes prosecutor who is co-chair of the
data privacy and cybersecurity practice at the law firm Jenner & Block, said the
latest DOJ action is “unique because of the breadth and scope” of the operation.
Other botnet takedowns were not as sweeping as this one, but Pillay said the
Department of Justice has used them to disrupt Sandworm attacks in the recent
past.
 
While some have raised privacy concerns about federal operations like this one,
Pillay said that because the government obtained a court-authorized search
warrant she sees that as a non-issue. The bigger question is whether the
government should be permitted to trespass into private computers and delete
things without notice to the owner. Pillay said that while she has heard of no
“pushback or risks” from prior botnet takedowns, there are outstanding questions
about how targeted such operations should be.
 
“Is it a bridge too far for the government to be going into private computers
and deleting things?” Pillay asked. “Does the government feel comfortable that
what they’re doing is controlled, and not otherwise impacting each
individual system?”
 
Ultimately, Pillay said, she finds it helpful to use a framework she read in the
New York University School of Law publication Just Security to think about the
legal case for operations like this one, particularly in light of the Department
of Justice’s charge to protect public safety.

The author of that article, April Falcon Doss, used an analogy to how the FBI
would react if bombs were planted on private property across multiple states. 

“[If] those bombs are armed and could go off at any time, the FBI is going to
take swift action to find and neutralize those devices — especially if it’s
difficult for property owners to detect them,” Doss wrote. “In exigent
circumstances like these, law enforcement would be justified in entering
directly onto the private property in order to neutralize the bombs and seize
the evidence. The nature of this remote access malware is, from a cyber threat
perspective, like an armed bomb.”

Corrected 4/11/22: to fix a misspelling of Scott Shackelford’s name.


-IN THIS STORY-

cybercrime, CyclopsBlink, Department of Justice, Federal Bureau of Investigation
(FBI), hacking, legal, Microsoft, Russia, Sandworm


RELATED NEWS

Threats


GLOBAL ADVERTISING GIANT...

by Tonya Riley • 13 hours ago
Threats


DHS INVESTIGATORS SAY...

by AJ Vicens • 17 hours ago
Geopolitics


FEDS WARN ABOUT FOREIGN...

by Tim Starks • 17 hours ago

 * Ad Specs
 * Sponsor
 * RSS

 * 
 * 
 * 
 * 

Privacy Policy © 2022 Scoop News Group | All Rights Reserved
Search for:
We use cookies to provide you with the best experience across all Scoop News
Group websites. By using Scoop News Group websites, you consent to the use of
cookies. Learn more
GOT IT!

✓
Thanks for sharing!
AddToAny
More…


The best cybersecurity news, delivered straight to your inbox.
Sign up for our daily newsletter.
Subscriber


Privacy Policy


SEARCH RESULTS

Magnifying Glass
Search
Close search results
Sort by:
RelevanceNewestOldest


FOUND 6,076 RESULTS


 1.  HOME
     
      * TagCybersecurity


 2.  RUSSIA TO CREATE ITS OWN SECURITY CERTIFICATE AUTHORITY, ALARMING EXPERTS
     
     Russia responds to economic sanctions hobbling renewals of its Internet
     security certificates by saying it will create its own.


 3.  BIDEN ADMINISTRATION IS STUDYING WHETHER TO SCALE BACK TRUMP-ERA CYBER
     AUTHORITIES AT DOD
     
     The Biden administration is considering revising the Trump-era policy that
     gave broad cyber authorities to the Department of Defense and Cyber
     Command.


 4.  SPY AGENCIES' LEAKS OF RUSSIAN PLANS POINT TO THE FUTURE OF INFORMATION
     WARFARE, SEN. WARNER SAYS
     
     Sen. Mark Warner discussed American intelligence successes and information
     warfare at a Washington think tank Monday.


 5.  DEBATE ERUPTS AT NEWS THE WHITE HOUSE MAY SCALE BACK DOD CYBER-OPS
     AUTHORITIES
     
     Cybersecurity and homeland security experts are split on the wisdom of
     scaling back broad authorities that DOD has to launch cyber operations.


 6.  RUSSIAN, CHINESE, BELARUSIAN HACKERS INCREASINGLY USING UKRAINE-THEMED
     LURES IN ATTACKS, GOOGLE OBSERVES
     
     The Threat Analysis Group report sheds light on international efforts to
     leverage the war in hacking campaigns.


 7.  GERMAN GOVERNMENT ISSUES WARNING ABOUT KASPERSKY PRODUCTS
     
     The Federal Office for Information Security, or BSI, did not accuse
     Kaspersky of any specific violations of customers' trust.


 8.  CYBER COMMAND CHIEF TELLS CONGRESS CHIP SHORTAGE HAS NATIONAL SECURITY
     IMPLICATIONS
     
     China's march toward chip independence is of "great concern" and could have
     "broader impacts," he said. It's an issue that dovetails with the
     Russia-Ukraine war.


 9.  KASPERSKY ADDED TO FCC LIST THAT BANS HUAWEI, ZTE FROM US NETWORKS
     
     Kaspersky is the first cybersecurity company and first Russian entity on
     the FCC's "Covered List," which so far has focused on China.


 10. CYBER COMPANY OKTA IS LATEST POTENTIAL VICTIM CITED BY LAPSUS$ HACKERS
     
     The financially motivated group of malicious hackers posted screenshots
     that Okta said could be related to "activity" detected in January.

Load more


FILTER OPTIONS


Search powered by Jetpack