News

01:26 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Busts Alleged Mega D Botnet Mastermind

Russian citizen Oleg Nilolaenko, arrested at a Las Vegas automotive show last month, is charged with operating botnet that in its heyday generated one-third of the world's spam.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)

According to the Milwaukee-Wisconsin Journal Sentinel, Federal Bureau of Investigation agents last month arrested the alleged mastermind behind the Mega-D botnet, named as Oleg Nikolaenko, a 23-year-old Moscow resident.

The Journal Sentinel reported, "agents from the FBI and the Federal Trade Commission had been tracking Nikolaenko's activities since at least 2007." Ultimately, he was arrested on November 4 while visiting Las Vegas to attend an automotive trade show and indicted on November 16 on one charge of violating the 2003 Can-Spam (Controlling the Assault of Non-Solicited Pornography and Marketing) Act. The timing and place of the arrest wasn't coincidental, since the Russian constitution forbids the extradition of its citizens.

The disclosure of the arrest followed The Smoking Gun's publication on Tuesday of an affidavit sworn last month by an FBI agent, which revealed that an ongoing grand jury probe was targeting Nikolaenko for violations of not only Can-Spam, but also for "abetting violations of the mail and wire fraud statutes."

The FBI Special Agent in question appears to be computer crime investigator Brett Banner, who transferred from Detroit to Milwaukee last year, said the Journal Sentinel.

According to the affidavit, the Mega-D botnet was used to send billions of scam emails per day on behalf of online criminals touting "herbal diet pills, male enhancement pills, and... counterfeit watches." Two such criminals, Jody Smith and Lance Atkinson, ultimately detailed their financial dealings with Nikolaenko to authorities. Atkinson, in particular, transferred $450,000 in commissions to Nikolaenko between June 2007 and December 2007 via online payment provider ePassporte. Finally, according to the Journal Sentinel, a subpoena of Nikolaenko's Gmail account revealed samples of malware similar to Mega-D.

Mega-D was forced offline in 2009 as a side project by employees at FireEye, an anti-botnet firm which develops equipment designed to detect suspicious network behavior.

But like so many botnets, Mega-D bounced back, ultimately generating 17% of all global spam at the end of 2009, according to M86 Labs. Earlier this year, however, researchers uncovered new weak links in the Mega-D command and control protocols, providing security firms with new techniques for defending against the botnet and fingerprinting infected machines.

Currently, Mega-D typically generates less than 5% of global spam, according to M86 Labs.

Comment  | 
Print  | 
More Insights
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed