Estonian Clickjacking Ring Totally Busted
A pretty ingenious con, all things considered.
An Eastern European clickjacking ring has been busted by American Law enforcement, stopping an organization that allegedly affected more than 4 million computers and scammed $14 million.
The scheme, concocted by Estonians Vladimir Tsastsin, Timur Gerassimenko, Dmitri Jegorow, Valeri Aleksejev, Konstantin Poltev and Anton Ivanov of and Russian Andrey Taame, involved the creation of a fake agency that contracting with online advertisers. They received a small fee every time an Internet user visited their website. In order to maximize their payoff, they distributed malware called DNSChanger which infected unwitting Internet users' computers and reconfigured DNS settings so that users would be redirected to the advertiser's sites if they clicked links generated by search engine results..
For instance, users who clicked a link to the Internal Revenue Service were redirected to H&R Block. Users who clicked links for iTunes were sent to www.idownload-store-music.com. Though the total of computers affected worldwide is near 4 million, around 500,000 American computers were affected. Individual Internet users were not themselves robbed by the ring - though if they purchased H&R Block's services, they were definitely robbed; Zing! - however, the malware does prevent infected computers from downloading security updates, leaving the vulnerable to other infections. The FBI has posted a handout for people who suspect their computer may be infected.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
USB-C cable CT scan reveals sinister active electronics — O.MG pen testing cable contains a hidden antenna and another die embedded in the microcontroller
Hackers breach Wi-Fi network of U.S. firm from Russia — daisy chain attack jumps from network to network to gain access from thousands of miles away
-
nurgletheunclean I-tunes -> idownload-store-music, irs -> hr block. I seems very well engineered. I can't help suspect that those companies knew what they were paying them for.Reply -
mouse24 This can pretty much be done in the command line, honestly it was a semi inventive way to make a bit of cash, sure people were a bit annoyed at the so called malware but still, it didn't infect files nor did it take credit card information.Reply
Surely this must be a slap on the wrist type of offense
Couldn't there prosecution have been prevented if they put up a small flier on there landing page saying "you agree that by visiting this site that the site owners cannot be held responsible for anything downloaded, etc etc etc." (bad wording, but im not a lawyer...) -
a sandwhich I am pretty sure I got this. Or something like it. Everytime I clicked a link it would redirect me somewhere. I just removed that old vista partition and got on with my life.Reply -
ikyung I wonder why these con artists would clickjack iTunes Apple users? They are the smartest bunch of the IT flock. Obviously they would have erased the malware instantly! ......... Right?Reply -
alyoshka What is interesting is that there is no mention of the time frame when all this happened. They finally got busted, but when? they started off with this DNS Changer thingy from the Idiots book of blah blah blah but when? and how long did it take them make the 14Million greens? how long did it take them to infect the 4Million rigs and the 500,000 geeks?Reply -
sa1nt scrumworksTypical Estonian. Bunch of crooks whole nation.All names and surnames are russian they just had estonian nationality.Reply
-
cookoy they should have patented the scheme, sold the info to the AV makers and live off the licensing fees they charge for each AV license sold.Reply