About: Operation Tovar     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:State100024720, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FOperation_Tovar&invfp=IFP_OFF&sas=SAME_AS_OFF

Operation Tovar is an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which is believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware. In early June 2014, the U.S. Department of Justice announced that Operation Tovar had temporarily succeeded in cutting communication between Gameover ZeuS and its command-and-control servers.

AttributesValues
rdf:type
rdfs:label
  • Operazione Tovar (it)
  • 2014年トーヴァー作戦 (ja)
  • Operation Tovar (en)
rdfs:comment
  • トーヴァー作戦(英 Operation Tovar)は、インターネット犯罪の温床となっていたGameover ZeuSのボットネットに対して、2014年に複数の国の法執行機関によって実施された国際共同作戦である。Gameover ZeuSのボットネットは、銀行詐欺やCryptoLockerというマルウェアの配布に使用されてきたと捜査関係者によって信じられている。 (ja)
  • Operation Tovar is an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which is believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware. In early June 2014, the U.S. Department of Justice announced that Operation Tovar had temporarily succeeded in cutting communication between Gameover ZeuS and its command-and-control servers. (en)
  • Operazione Tovar è un'operazione condotta congiuntamente da forze di polizia di vari Paesi contro il botnet , che secondo gli investigatori è stato usato in una e nella distribuzione del ransomware CryptoLocker. Ai primi di giugno 2014 lo U.S. Department of Justice annunciò che l'operazione Tovar era momentaneamente riuscita ad interrompere la comunicazione tra Gameover ZeuS e i suoi server di comando e controllo. (it)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Operation Tovar is an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which is believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware. Participants include the U.S. Department of Justice, Europol, the FBI and the U.K. National Crime Agency, South African Police Service, together with a number of security companies and academic researchers, including Dell SecureWorks, , Microsoft Corporation, , Afilias, F-Secure, Level 3 Communications, McAfee, Neustar, Shadowserver, Anubisnetworks, Symantec, , Sophos and Trend Micro, and academic researchers from Carnegie Mellon University, the Georgia Institute of Technology, VU University Amsterdam and Saarland University. Other law enforcement organizations involved include the Australian Federal Police; the ' ; the European Cybercrime Centre (EC3); Germany’s Bundeskriminalamt; France’s Police Judiciaire; Italy’s Polizia Postale e delle Comunicazioni; Japan’s National Police Agency; Luxembourg’s Police Grand Ducale; New Zealand Police; the Royal Canadian Mounted Police; and Ukraine’s Ministry of Internal Affairs' . The Defense Criminal Investigative Service of the U.S. Department of Defense also participated in the investigation. In early June 2014, the U.S. Department of Justice announced that Operation Tovar had temporarily succeeded in cutting communication between Gameover ZeuS and its command-and-control servers. The criminals attempted to send a copy of their database to a safe location, but it was intercepted by agencies already in control of part of the network. Russian Evgeniy Bogachev, aka "lucky12345" and "Slavik", was charged by the US FBI for being the ringleader of the gang behind Gameover Zeus and Cryptolocker. The database indicates the scale of the attack, and it makes decryption of CryptoLocked files possible. In August 2014 security firms involved in the shutdown, Fox-IT and FireEye, created a portal, called Decrypt Cryptolocker, which allows any of the 500,000 victims to find the key to unlock their files. Victims need to submit an encrypted file without sensitive information, which allows the unlockers to deduce which encryption key was used. It is possible that not all CryptoLocked files can be decrypted, nor files encrypted by different ransomware. Analysis of data that became available after the network was taken down indicated that about 1.3% of those infected had paid the ransom; many had been able to recover files that had been backed up, and others are believed to have lost huge amounts of data. Nonetheless, the gang was believed to have extorted about US$3m. (en)
  • Operazione Tovar è un'operazione condotta congiuntamente da forze di polizia di vari Paesi contro il botnet , che secondo gli investigatori è stato usato in una e nella distribuzione del ransomware CryptoLocker. Vi partecipano U.S. Department of Justice, Europol, FBI e la britannica National Crime Agency, , oltre a numerose società e studiosi in ambito sicurezza, tra cui , , Microsoft Corporation, , , F-Secure, , McAfee, , , Anubisnetworks, Symantec, , Sophos e , e ricercatori scientifici di Carnegie Mellon University, Georgia Institute of Technology, VU University Amsterdam e Università del Saarland. Concorrono anche altri organismi di polizia quali Australian Federal Police;; European Cybercrime Centre (EC3); Bundeskriminalamt (Germania); Direction centrale de la Police judiciaire (Francia); Polizia Postale e delle Comunicazioni (Italia); Agenzia nazionale di polizia (Giappone); Police Grand-Ducale (Lussemburgo); ; Royal Canadian Mounted Police; e (Ucraina). Anche il dello U.S. Department of Defense ha partecipato alle indagini. Ai primi di giugno 2014 lo U.S. Department of Justice annunciò che l'operazione Tovar era momentaneamente riuscita ad interrompere la comunicazione tra Gameover ZeuS e i suoi server di comando e controllo. I criminali tentarono di mandare una copia del loro database in un posto sicuro, ma fu intercettato dagli organi che avevano già preso il controllo di una parte della rete. Il russo Evgeniy Bogachev, conosciuto con gli pseudonimi "lucky12345" e "slavik", fu accusato dall'FBI di essere il capobanda dei malfattori che animavano Gameover ZeuS e CriptoLocker. Il database dimostra la vastità dell'attacco, e rende possibile la decifrazione di file compromessi da CryptoLocker. Nell'agosto 2014 due imprese di sicurezza impegnate nell'arresto, Fox-IT e FireEye, crearono un portale, chiamato Decrypt Cryptolocker, che permette ad ognuna delle 500 000 vittime di trovare la chiave che sblocca i suoi file. È necessario che le vittime mandino un loro file "bloccato" non contenente informazioni sensibili, che permette agli "sbloccatori" di dedurre quale chiave crittografica fosse stata usata. Non si riescono a decrittare proprio tutti i file infetti da CryptoLocker, né tantomeno file criptati con un ransomware differente. L'analisi dei dati divenuti disponibili dopo lo smantellamento della rete indicava che circa l'1,3% degli infettati avesse pagato il riscatto; molti avevano potuto recuperare file di cui avevano un backup, e altri presumibilmente hanno perso enormi quantità di dati. Nondimeno, si ritenne che la banda avesse estorto circa 3 milioni di dollari americani. (it)
  • トーヴァー作戦(英 Operation Tovar)は、インターネット犯罪の温床となっていたGameover ZeuSのボットネットに対して、2014年に複数の国の法執行機関によって実施された国際共同作戦である。Gameover ZeuSのボットネットは、銀行詐欺やCryptoLockerというマルウェアの配布に使用されてきたと捜査関係者によって信じられている。 (ja)
gold:hypernym
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 63 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software