Seven arrested in massive clickjacking case

Life

10 November 2011

The US Department of Justice (DoJ) is charging seven individuals with 27 counts of wire fraud and other computer-related crimes, alleging that the group hijacked 4 million computers across 100 countries in a sophisticated clickjacking scheme.

According to the indictment, the defendants had set up a phony Internet advertising agency, entering into agreements with online ad providers that would pay the group whenever its ads where clicked on by users. The group’s malware, which it had planted on millions of user computers, would redirect the computers’ browsers to its advertisements, thereby generating illicit revenue.

The malware worked by capturing and altering the results of a user’s search engine query. A user would search for a popular site, such as Amazon, Apple or iTunes. Whenever the user would click on the provided link, however, the browser would be redirected to another website, one that the group was paid to generate traffic for.

Vulnerable

 

advertisement



 

The malware the group used also blocked antivirus software updates, which left users vulnerable to other attacks as well, according to the DoJ.

Six of the defendants resided in Estonia during the operation, which took place from 2007 to 2011. They were Vladimir Tsastsin, Timur Gerassimenko, Dmitri Jegorow, Valeri Aleksejev, Konstantin Poltev and Anton Ivanov. The seventh defendant, Andrey Taame, resided in Russia.

"The six Estonian defendants have been arrested by the Estonian police and the US is seeking to extradite them. Taame remains at large," said Preet Bharara, United States attorney for the Southern District of New York, in a press conference held in New York.

The DoJ filed the indictment in the US District Court of New York. Each defendant is charged with five counts of wire fraud and computer intrusion crimes, and Tsastsin is charged with 22 additional counts of money laundering.

The DOJ estimated that the group generated more than $14 million through its illicit scheme.

Space invaders

The malware network first came to the DoJ’s attention through NASA, which had more than 130 computers running the malware, according to NASA Inspector General Paul Martin, who also spoke at the press conference. While NASA continues to investigate the malware, the agency does not think that any of its critical operational systems were compromised by this software, Martin said.

In order to redirect browser requests, the group set up rogue DNS (Domain Name System) servers, located in data centers in New York and Chicago. "The malware changed the DNS settings so the infected computers’ [requests for website addresses] were routed not to legitimate DNS servers but to DNS rogue servers [allegedly] operated by the defendants," Bharara said. "The defendants’ plan was to infect computers, direct them to servers they controlled, then redirect traffic to unintended websites, and reap a financial windfall from this redirected traffic.

"Some of the website redirections were to websites of legitimate businesses. In these cases, such businesses, assuming they were paying for legitimate services to boost traffic, were unwitting victims in the fraud."

The Federal Bureau of Investigation has dismantled the group’s network, replacing its DNS servers with clean ones so that user disruption would be minimised. The FBI also provided Internet service providers with lists of which of their customers had the malware. The agency also set up a page with instructions on how to cleanse computers of the malicious software.

IDG News Service


Back to Top ↑

TechCentral.ie