📜 ⬆️ ⬇️

Law enforcement authorities rained down the Ramnit botnet

Law enforcement agencies, together with security companies, carried out an operation to capture and disable the infrastructure of a large botnet of Ramnit malware, which includes more than three million bots (infected computers). The organization participated in the operation Europol, as well as CERT of various countries of the world, including Germany, Italy, Holland, and the United Kingdom.



Ramnit itself (ESET: Win32 / Ramnit.X , Microsoft: Win32 / Ramnit , Trojan: WinNT / Ramnit , Symantec: W32.Ramnit , Hacktool.Rootkit ) has a modular architecture and was used by attackers for various purposes, including to steal data online banking users. Further, these stolen data were used to steal users ’money (criminal scheme). Ramnit has self-propagation mechanisms (file virus), performs many modifications on the system, and also contains a rootkit.
')
On the 24th of February, the European Cybercrime Center (EC3) has been coordinated and had been contacted. The operation involved.

Ramnit includes the following modules:

A list of various system modifications that one of the modifications of Ramnit can implement in the system here . To ensure its survival in the system, it completely disrupts the work of the protected mode of Windows by removing the registry keys that are responsible for its implementation.

Source: https://habr.com/ru/post/251577/


All Articles