Avalanche Cybercriminal Infrastructure Takedown

Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure!  The U.S. Attorney’s Office, FBI, Europol, German Police, and others from over 40 countries were involved in disrupting one of the largest support structures for malware, digital money laundering, and Distributed Denial-of-Service (DDoS) attacks.  Searches, seizures, and arrests in four countries were conducted to dismantle the sophisticated network of people and technology.

Burying Malware

Avalanche hosted, supported, and distributed dozens of malware families, including Citadel, TeslaCrypt, VM-Zues, bugat, QakBot, and many others.  For a complete list, visit the US-CERT announcement page.  Most notably, it targeted over 40 major financial institutions and hosted major ransomware malware.  According to the U.S. CERT team, it was “used to run money mule schemes where criminals recruited people to commit fraud involving transporting and laundering stolen money or merchandise”.

The Avalanche group has been very active for many years.  Back in 2010 it was known for its phishing activities and involvement with various Zeus banking trojan malware variants.

This takedown will have a cascading impact to cybercriminals who have relied on its capabilities.  It will likely result in a reduced amount of activity until such time as criminals can replace or rebuild these functions.  It is a greatly appreciated reprieve.  The absence of money laundering services will also be a painful hit to many criminal groups.  With Avalanche down or at the very least impacted, it will force changes on behalf of the criminals it serviced.  Those deviations represent opportunities for law enforcement’s future actions.

Hidden Benefits

Depending upon the systems and data captured and the cooperation of the people arrested, there may be some great intelligence benefits.  Law enforcement may be able to track down some of the organized criminals behind the various malware families and cyber-fraud campaigns.  This could lead to more arrests and impacts to malware generation.

 

A job well done by the multinational team who cooperated to bring down this malignant structure supporting cybercriminals impacting people, governments, and businesses across the globe.  Keep up the good work!

 

References:

 

Interested in more? Follow me on Twitter (@Matt_Rosenquist) and LinkedIn to hear insights and what is going on in cybersecurity.

Published on Categories SecurityTags ,
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.