Change Edition

Raging botnet infected 100 servers in Luxembourg
Luxembourg

Raging botnet infected 100 servers in Luxembourg

06.12.2013 From our online archive
A scam to infect a network of private computers with malicious software to send spam from Luxembourg has been neutralised as part of a transatlantic operation.

A scam to infect a network of private computers with malicious software to send spam from Luxembourg has been neutralised as part of a transatlantic operation.

The raging botnet known as ZeroAccess, thought to have infected around 100 IP addresses in Luxembourg, is currently being dismantled, Luxembourg Police's new technologies section has revealed.

They have reportedly seized several servers in the Grand Duchy and will contact users directly harmed as the investigation progresses.

The malware spread by ZeroAccess is thought to have affected more than 2 million computers worldwide, specifically targeting data search engines Google, Bing and Yahoo.

The malware gained remote control of thousands of computers to commit a string of crimes including misappropriation of research, unlawful interference on research data or forwarding requests to sites not requested, all in order to steal money from the victim.

The international operation was carried out with the help of the European Centre for Cybercrime EUROPOL (EC3) and cybercrime units in Germany, Latvia, Switzerland, the Netherlands and Luxembourg.