Jump to content

Operation: Bot Roast: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
Alter: title. | You can use this bot yourself. Report bugs here. | Suggested by Neko-chan | Category:Federal Bureau of Investigation operations | via #UCB_Category 16/67
Missing or empty |title= solved
(5 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{short description|FBI operation targeting botnet operators}}
{{short description|FBI operation targeting botnet operators}}
{{Use dmy dates|date=September 2011}}
{{Use dmy dates|date=July 2021}}
'''Operation: Bot Roast''' is an operation by the [[FBI]] to track down [[bot herder]]s, crackers, or virus coders who install malicious software on computers through the Internet without the owners' knowledge, which turns the computer into a [[Zombie (computer science)|zombie computer]] that then sends out spam to other computers from the compromised computer, making a [[botnet]] or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to [[national security]].<ref name="fbi">{{cite press release | title = OPERATION: BOT ROAST 'Bot-herders' Charged as Part of Initiative | publisher = Federal Bureau of Investigation | date = 2007-06-13 | url = https://www.fbi.gov/news/stories/2007/june/botnet_061307 | accessdate = 2012-11-26 }}</ref>
'''Operation: Bot Roast''' is an operation by the [[FBI]] to track down [[bot herder]]s, crackers, or virus coders who install malicious software on computers through the Internet without the owners' knowledge, which turns the computer into a [[Zombie (computer science)|zombie computer]] that then sends out spam to other computers from the compromised computer, making a [[botnet]] or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to [[national security]].<ref name="fbi">{{cite press release | title = OPERATION: BOT ROAST 'Bot-herders' Charged as Part of Initiative | publisher = Federal Bureau of Investigation | date = 2007-06-13 | url = https://www.fbi.gov/news/stories/2007/june/botnet_061307 | access-date = 2012-11-26 }}</ref>


The operation was created to disrupt and disassemble bot herders. In June 2007, the [[FBI]] had identified about 1 million computers that were compromised, leading to the arrest of the persons responsible for creating the [[malware]]. In the process, owners of infected computers were notified, many of whom were unaware of the exploitation.<ref name="fbi" /><ref>{{cite press release | title = FBI tries to fight zombie hordes | publisher = BBC News | date = 2007-06-14 | url = http://news.bbc.co.uk/2/hi/technology/6752853.stm | accessdate = 2007-06-20}}</ref>
The operation was created to disrupt and disassemble bot herders. In June 2007, the [[FBI]] had identified about 1 million computers that were compromised, leading to the arrest of the persons responsible for creating the [[malware]]. In the process, owners of infected computers were notified, many of whom were unaware of the exploitation.<ref name="fbi" /><ref>{{cite news | title = FBI tries to fight zombie hordes | work = BBC News | date = 2007-06-14 | url = http://news.bbc.co.uk/2/hi/technology/6752853.stm | access-date = 2007-06-20}}</ref>


Some early results of the operation include charges against the following:
Some early results of the operation include charges against the following:
# [[Robert Matthew Bentley]] (known as "lsdigital") of Panama City Florida, pleaded guilty to charges of computer fraud and conspiracy to commit computer fraud for using botnets to install advertising software.<ref>{{cite magazine |url=https://www.computerworld.com/article/2785859/hacker-gets-41-months-for-running-rogue-botnet.html |title=Hacker gets 41 months for running rogue botnet |access-date=2023-09-15 |magazine=Computer World}}</ref>
# [[Robert Alan Soloway]] of [[Seattle, Washington]], pleaded guilty to charges of using botnets to send tens of millions of spam messages touting his website.<ref name="fbi" />
# [[Robert Alan Soloway]] of [[Seattle]], Washington, pleaded guilty to charges of using botnets to send tens of millions of spam messages touting his website.<ref name="fbi" />
# [[Jeanson James Ancheta]] pleaded guilty to controlling thousands of infected computers.<ref name="theregister_2007">{{cite web |date=13 June 2007<!-- 22:45 GMT-->|url = https://www.theregister.co.uk/2007/06/13/millionth_botnet_address/|title = FBI logs its millionth zombie address|publisher = [[the register]]| accessdate = 2008-09-26 | last=Dan Goodin |quote=}}</ref>
# [[Jeanson James Ancheta]] pleaded guilty to controlling thousands of infected computers.<ref name="theregister_2007">{{cite web |date=13 June 2007 |url = https://www.theregister.co.uk/2007/06/13/millionth_botnet_address/|title = FBI logs its millionth zombie address|work = The Register | access-date = 2008-09-26 | first=Dan |last=Goodin}}</ref>
# [[Jason Michael Downey]] (known as "Nessun"), founder of the [[IRC]] network [[Rizon]], is charged with using botnets to disable other systems.<ref name="fbi" />
# [[Jason Michael Downey]] (known as "Nessun"), founder of the [[IRC]] network [[Rizon]], is charged with using botnets to disable other systems.<ref name="fbi" />
# [[Akbot]] author [[Owen Walker]] (known as "AKILL") of New Zealand, was tried for various crimes and discharged by the prosecution in 2008.<ref>[http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A Akill pleads guilty to all charges] {{webarchive|url=https://web.archive.org/web/20080411102559/http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A |date=11 April 2008 }}, By Ulrika Hedquist, 1 April 2008, Computerworld</ref>
# [[Akbot]] author [[Owen Walker]] (known as "AKILL") of New Zealand, was tried for various crimes and discharged by the prosecution in 2008.<ref>{{cite news |url=http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A |title=Akill pleads guilty to all charges |first=Ulrika |last=Hedquist |date=1 April 2008 |work=Computerworld |archive-url=https://web.archive.org/web/20080411102559/http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A |archive-date=11 April 2008}}</ref>


==References==
==References==

Revision as of 08:17, 15 September 2023

Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners' knowledge, which turns the computer into a zombie computer that then sends out spam to other computers from the compromised computer, making a botnet or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to national security.[1]

The operation was created to disrupt and disassemble bot herders. In June 2007, the FBI had identified about 1 million computers that were compromised, leading to the arrest of the persons responsible for creating the malware. In the process, owners of infected computers were notified, many of whom were unaware of the exploitation.[1][2]

Some early results of the operation include charges against the following:

  1. Robert Matthew Bentley (known as "lsdigital") of Panama City Florida, pleaded guilty to charges of computer fraud and conspiracy to commit computer fraud for using botnets to install advertising software.[3]
  2. Robert Alan Soloway of Seattle, Washington, pleaded guilty to charges of using botnets to send tens of millions of spam messages touting his website.[1]
  3. Jeanson James Ancheta pleaded guilty to controlling thousands of infected computers.[4]
  4. Jason Michael Downey (known as "Nessun"), founder of the IRC network Rizon, is charged with using botnets to disable other systems.[1]
  5. Akbot author Owen Walker (known as "AKILL") of New Zealand, was tried for various crimes and discharged by the prosecution in 2008.[5]

References

  1. ^ a b c d "OPERATION: BOT ROAST 'Bot-herders' Charged as Part of Initiative" (Press release). Federal Bureau of Investigation. 13 June 2007. Retrieved 26 November 2012.
  2. ^ "FBI tries to fight zombie hordes". BBC News. 14 June 2007. Retrieved 20 June 2007.
  3. ^ "Hacker gets 41 months for running rogue botnet". Computer World. Retrieved 15 September 2023.
  4. ^ Goodin, Dan (13 June 2007). "FBI logs its millionth zombie address". The Register. Retrieved 26 September 2008.
  5. ^ Hedquist, Ulrika (1 April 2008). "Akill pleads guilty to all charges". Computerworld. Archived from the original on 11 April 2008.