therecord.media
Open in
urlscan Pro
2606:4700:4400::ac40:9b4b
Public Scan
URL:
https://therecord.media/911-S5-botnet-takedown-arrest
Submission: On May 30 via api from TR — Scanned from DE
Submission: On May 30 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * Elections * Technology * Cyber Daily® * Click Here Podcast Go Subscribe to The Record ✉️ Free Newsletter The splash page for the takedown of the 911 S5 botnet. James Reddick May 29th, 2024 * Cybercrime * Malware * News * China * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. What is Threat Intelligence BOTNET DOWN AND ADMINISTRATOR ARRESTED IN 911 S5 CASE, FBI SAYS The FBI and international partners say they have dismantled a massive botnet that had infected more than 19 million IP addresses across 200 countries and was used for years to conceal cybercrime. The 911 S5 botnet’s alleged administrator, Chinese national YunHe Wang, was arrested on May 24 and faces up to 65 years in prison, the Department of Justice said. On Tuesday, Wang and several alleged associates, as well as three Thai businesses, were sanctioned by the Treasury Department in relation to the botnet. Beginning in 2014, Wang allegedly created and disseminated malware that compromised millions of Windows operating systems, including more than 600,000 IP addresses in the U.S., prosecutors said. He allegedly generated about $99 million from subscribers to the residential proxy service, which gave people access to the compromised IP addresses so they could mask their online activity. He faces charges related to computer fraud, wire fraud and money laundering. “This Justice Department-led operation brought together law enforcement partners from around the globe to disrupt 911 S5, a botnet that facilitated cyber-attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations,” said Attorney General Merrick B. Garland. Prosecutors say that customers using the service stole $5.9 billion from federal pandemic relief programs through fraudulent applications. Wang is accused of spreading malware through malicious virtual private network (VPN) programs like MaskVPN and DewVPN, as well as pirated materials bundled with the malware. He allegedly had approximately 150 servers worldwide, about half of which were leased from U.S.-based service providers. Authorities seized 23 internet domains and more than 70 servers, which the DOJ said were the “backbone” of a prior residential proxy service that shuttered in 2022, as well as a “recent incarnation of the service.” “By seizing multiple domains tied to the historical 911 S5, as well as several new domains and services directly linked to an effort to reconstitute the service, the government has successfully terminated Wang’s efforts to further victimize individuals through his newly formed service Clourouter.io and closed the existing malicious backdoors,” the DOJ said. Investigators allege Wang used the proceeds from the service to buy property in the U.S., China, Singapore, Thailand, the United Arab Emirates and St. Kitts and Nevis, where he also has citizenship. A substantial collection of luxury cars — like a Ferrari F8, several BMWs and a Rolls Royce — is subject to forfeiture, along with his 21 properties. The investigation into 911 S5 came onto law enforcement’s radar during an investigation into more than 2,000 fraudulent orders placed with stolen credit cards on an e-commerce platform called ShopMyExchange, which is connected to the Army and Air Force Exchange Service. The perpetrators in Ghana and the U.S. were allegedly using IP addresses acquired from 911 S5. The Justice Department has taken out multiple botnets this year with links to nation-state hacking activity. In January, it announced an operation to dismantle a botnet consisting of infected home routers used by the China-linked hacking group Volt Typhoon. The following month, the DOJ said it dismantled a similar botnet network used by the APT28 group within Russia’s Main Intelligence Directorate of the General Staff (GRU). * * * * * Tags * botnet * Law enforcement * FBI * arrests * Arrest Previous articleNext article Nurses at Ascension hospital in Michigan raise alarms about safety following ransomware attack Indian police arrest five accused of trafficking people into scam compounds James Reddick has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment. BRIEFS * Ransomware attack on Seattle Public Library knocks out online systemsMay 28th, 2024 * Feds continue to rack up convictions in BEC cases as Georgia man gets 10-year sentenceMay 22nd, 2024 * CISA to tap cyber policy veteran Jeff Greene for top roleMay 22nd, 2024 * HHS offering $50 million for proposals to improve hospital cybersecurityMay 20th, 2024 * EPA says it will step up enforcement to address ‘critical’ vulnerabilities within water sectorMay 20th, 2024 * Cyber firm CyberArk inks $1.54 billion deal to acquire VenafiMay 20th, 2024 * CISA official Eric Goldstein will leave agency in JuneMay 20th, 2024 * Company that assists health care insurers discloses 2023 data breachMay 17th, 2024 * Sonne Finance developers offer bounty to hacker behind $20 million crypto theftMay 15th, 2024 GITCAUGHT: THREAT ACTOR LEVERAGES GITHUB REPOSITORY FOR MALICIOUS INFRASTRUCTURE GitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure EXPLORING THE DEPTHS OF SOLARMARKER'S MULTI-TIERED INFRASTRUCTURE Exploring the Depths of SolarMarker's Multi-tiered Infrastructure RUSSIA-LINKED COPYCOP USES LLMS TO WEAPONIZE INFLUENCE CONTENT AT SCALE Russia-Linked CopyCop Uses LLMs to Weaponize Influence Content at Scale IRAN-ALIGNED EMERALD DIVIDE INFLUENCE CAMPAIGN EVOLVES TO EXPLOIT ISRAEL-HAMAS CONFLICT Iran-Aligned Emerald Divide Influence Campaign Evolves to Exploit Israel-Hamas Conflict “MOBILE NOTPETYA”: SPYWARE ZERO-CLICK EXPLOIT DEVELOPMENT INCREASES THREAT OF WORMABLE MOBILE MALWARE “Mobile NotPetya”: Spyware Zero-Click Exploit Development Increases Threat of Wormable Mobile Malware * * * * * * Privacy * About * Contact Us © Copyright 2024 | The Record from Recorded Future News