Department of Justice Provides Update on Gameover Zeus and Cryptolocker Disruption
(M2 PressWIRE Via Acquire Media NewsEdge) The Justice Department today filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting the Gameover Zeus botnet and the malicious software known as Cryptolocker. The disruption began in late May, when the Justice Department implemented a series of Court-authorized measures to neutralize Gameover Zeus and Cryptolocker - two of the most sophisticated and destructive forms of malicious software in existence.
In the status report, the Justice Department informed the Court that the technical and legal measures undertaken to disrupt Gameover Zeus and Cryptolocker have proven successful, and that significant progress has been made in remediating computers infected with Gameover Zeus.
The Justice Department reported that all or nearly all of the active computers infected with Gameover Zeus have been liberated from the criminals' control and are now communicating exclusively with the substitute server established pursuant to court order. The Justice Department also reported that traffic data from the substitute server shows that remediation efforts by internet service providers and victims have reduced the number of computers infected with Gameover Zeus by 31 percent since the disruption commenced.
The Justice Department also reported that Cryptolocker has been neutralized by the disruption and cannot communicate with the infrastructure used to control the malicious software. As a result, Cryptolocker is effectively non-functional and unable to encrypt newly infected computers.
Computer users who believe they may be infected with Gameover Zeus are encouraged to visit the Department of Homeland Security's dedicated Gameover Zeus webpage, which is located at www.us-cert.gov/gameoverzeus . Among other resources, the webpage includes links to tools from trusted vendors that can detect and remove the Gameover Zeus infection.
(c) 2014 M2 COMMUNICATIONS
[ InfoTech Spotlight's Homepage ]