Jump to content

Operation: Bot Roast: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
mNo edit summary
mNo edit summary
Line 8: Line 8:
*James C. Brewer of [[Arlington, Texas]], is accused of infecting tens of thousands of computers worldwide, including some at [[Chicago]]-area hospitals.<ref name="fbi" />
*James C. Brewer of [[Arlington, Texas]], is accused of infecting tens of thousands of computers worldwide, including some at [[Chicago]]-area hospitals.<ref name="fbi" />
*[[Jeanson James Ancheta]] plead guilty to controlling thousands of infected computers.<ref name="theregister_2007">{{cite web |date=13 June 2007<!-- 22:45 GMT-->|url = http://www.theregister.co.uk/2007/06/13/millionth_botnet_address/|title = FBI logs its millionth zombie address|format = HTML |publisher = [[the register]]| accessdate = 2008-09-26 | last=Dan Goodin |quote=}}</ref>
*[[Jeanson James Ancheta]] plead guilty to controlling thousands of infected computers.<ref name="theregister_2007">{{cite web |date=13 June 2007<!-- 22:45 GMT-->|url = http://www.theregister.co.uk/2007/06/13/millionth_botnet_address/|title = FBI logs its millionth zombie address|format = HTML |publisher = [[the register]]| accessdate = 2008-09-26 | last=Dan Goodin |quote=}}</ref>
*Jason Michael Downey aka "Nessun", founder of the [[IRC]] network [[Rizon]], is charged with using botnets to disable other systems.<ref name="fbi" />
*Jason Michael Downey (psuedonym "Nessun"), founder of the [[IRC]] network [[Rizon]], is charged with using botnets to disable other systems.<ref name="fbi" />
* [[Akbot]] author [[Owen Walker]] (pseudonym "AKILL") of [[New Zealand]], was tried for various crimes and discharged by the prosecution in 2008.<ref>[http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A Akill pleads guilty to all charges]</ref>
* [[Akbot]] author [[Owen Walker]] (pseudonym "AKILL") of [[New Zealand]], was tried for various crimes and discharged by the prosecution in 2008.<ref>[http://computerworld.co.nz/news.nsf/news/A4C8AD60A514BC88CC25741D007C894A Akill pleads guilty to all charges]</ref>
* Ryan Goldstein of [[Ambler, Pennsylvania]], pleaded guilty to aiding and abetting another person to gain unauthorized access to a protected computer with accomplice [[Owen Walker]].<ref>[http://media.www.dailypennsylvanian.com/media/storage/paper882/news/2007/11/29/News/Engineering.Junior.Indicted.On.Federal.Computer.Hacking.Charges-3123291.shtm Engineering junior indicted on federal computer hacking charges]</ref>
* Ryan Goldstein of [[Ambler, Pennsylvania]], pleaded guilty to aiding and abetting another person to gain unauthorized access to a protected computer with accomplice [[Owen Walker]].<ref>[http://media.www.dailypennsylvanian.com/media/storage/paper882/news/2007/11/29/News/Engineering.Junior.Indicted.On.Federal.Computer.Hacking.Charges-3123291.shtm Engineering junior indicted on federal computer hacking charges]</ref>

Revision as of 19:17, 8 November 2009

Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners’ knowledge, which turns the computer into a zombie computer that then sends out spam to other computers from the compromised computer, making a botnet or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to national security.[1]

The results

The operation was created to disrupt and disassemble bot herders. In June 2007, the FBI had identified about 1 million computers that were compromised, leading to the arrest of the persons responsible for creating the malware. In the process, owners of infected computers were notified, many of whom were unaware of the exploitation.[1][2]

Some early results of the operation include charges against the following:

  • Robert Alan Soloway of Seattle, Washington, pleaded guilty to charges of using botnets to send tens of millions of spam messages touting his website.[1]
  • James C. Brewer of Arlington, Texas, is accused of infecting tens of thousands of computers worldwide, including some at Chicago-area hospitals.[1]
  • Jeanson James Ancheta plead guilty to controlling thousands of infected computers.[3]
  • Jason Michael Downey (psuedonym "Nessun"), founder of the IRC network Rizon, is charged with using botnets to disable other systems.[1]
  • Akbot author Owen Walker (pseudonym "AKILL") of New Zealand, was tried for various crimes and discharged by the prosecution in 2008.[4]
  • Ryan Goldstein of Ambler, Pennsylvania, pleaded guilty to aiding and abetting another person to gain unauthorized access to a protected computer with accomplice Owen Walker.[5]

See also

References

  1. ^ a b c d e "OPERATION: BOT ROAST 'Bot-herders' Charged as Part of Initiative" (Press release). Federal Bureau of Investigations. 2007-06-13. Retrieved 2007-06-20.
  2. ^ "FBI tries to fight zombie hordes" (Press release). BBC News. 2007-06-14. Retrieved 2007-06-20.
  3. ^ Dan Goodin (13 June 2007). "FBI logs its millionth zombie address" (HTML). the register. Retrieved 2008-09-26.
  4. ^ Akill pleads guilty to all charges
  5. ^ Engineering junior indicted on federal computer hacking charges