PDA

View Full Version : FTC persuades court to shutter rogue ISP



standin
06-05-2009, 02:43 PM
FTC persuades court to shutter rogue ISP
Robert Lemos, SecurityFocus 2009-06-05

A federal district court in San Jose shut down an alleged rogue Internet service provider, after the Federal Trade Commission documented the ISP's cooperation with online criminals and child pornographers, the agency announced on Thursday.

The takedown of the Internet service provider, Triple Fiber Network, comes after a months-long investigation by the FTC in collaboration with other government agencies and industry. The court ordered the ISP's upstream providers on Tuesday to disconnect Triple Fiber Network from their systems, cutting it off from the Internet, without notifying the company.

The FTC's complaint (http://www.ftc.gov/opa/2009/06/3fn.shtm)against Triple Fiber Network, and it's Belize-based parent company Pricewert LLC, states that the ISP hosted little legitimate content, instead selling its services to botnet operators, phishing scammers, and child pornographers.



“ These guys operate under a rock, and when you turn over the rock, they are not just going to go away ... they are going to scatter. ”André DiMino, co-founder and director, Shadowserver Foundation



The takedown is an unprecedented move by the FTC and marks an escalation of the government and security community's investigations of the Internet service providers that facilitate online crime. Last September, the upstream providers of rogue ISP Atrivo cut off the rogue ISP from the Internet (http://voices.washingtonpost.com/securityfix/2008/09/internet_shuns_us_based_isp_am.html), after security researchers offered up significant evidence of the company's wrongdoing. Two months later, the scenario repeated: This time, upstream providers for rogue ISP McColo cut off the haven for online criminals (http://www.securityfocus.com/brief/855) after reporter Brian Krebs documented evidence against the company. The volume of spam on the Internet immediately dropped to a third (http://www.securityfocus.com/brief/938)of its previous levels, and it took almost a half year for online scammers to recover.
"Pricewert is fully aware that it it hosting huge volumes of illegal, malicious, and harmful content," the FTC argue in its complaint filed with the court. "Moreover, Pricewert actively shields its criminal clientele by either ignoring takedown requests issued by the online security community or shifting its criminal clients to other Internet protocol addresses controlled by Pricewert so that they may evade detection."

The latest takedown came after an in-depth investigation of Triple Fiber Network by the Federal Trade Commission, which brought in experts from NASA's Office of Inspector General, the National Center for Missing and Exploited Children, and researchers at the University of Alabama, the Shadowserver Foundation, the Spamhaus Project, and Symantec, the owner of SecurityFocus.

"It is groundbreaking that the FTC would present and package such a good case for the takedown," said André DiMino, co-founder and director of the Shadowserver Foundation. "They did their homework."

The FTC approached DiMino in April to help document the amount of malicious activity originating from IP addresses belonging to Triple Fiber Network. DiMino found that the company — which also uses the names 3FN, APS Telecom, APX Telecom, and APS Communications — hosted the command-and-control servers for more than 4,576 unique malicious software programs. In addition, more than 311 unique IP addresses owned by 3FN were involved in malicious activity, according to Shadowserver's database.

The ISP hosted the command-and-control servers for the Cutwail botnet, among others, according the security firm Symantec. The security company found more than 600 IP addresses controlled by 3FN that were also launching attacks.

"The attacks we saw ran the gauntlet," said Vincent Weafer, vice president of Symantec's Security Response group. "A lot of attack activity, a lot of denial-of-service attacks, and botnet activity."

A NASA special agent, Sean Zadig, initially traced the malicious activity to 3FN during an investigation into attacks on the U.S. space administration's networks. The trail initially led to servers owned by McColo, the rogue Internet service provider taken down in November 2008. Zadig received a search warrant for the contents of McColo's servers and found connections between McColo and 3FN, including ICQ message logs f conversations in Russian between customers and the owners of two 3FN accounts, labeled "Head of Programming Department" and "Senior Project Manager".

In one exchange, documented in the court filing, a customer asks 3FN's Senior Project Manager whether they can host a botnet of 20,000 compromised computers aimed at committing click fraud.

"Well, we can manage it," 3FN's Senior Project Manager stated. "To earn 500 USD per day you need to have 20 000 clicks approx."

SecurityFocus requested an interview with Pricewert through e-mail, but the company did not reply. A call to a number listed in several press releases was answered by a man with an Eastern European accent, who stated that the company would not provide comment.

Both Symantec's Weafer and Shadowserver's DiMino predicted far less of an impact from the takedown than what had been witnessed when McColo was disconnected form the Internet. The scammers and online criminals that use rogue ISPs likely learned not to rely on any single hosting provider, DiMino said.

"These guys operate under a rock, and when you turn over the rock, they are not just going to go away," he said. "Unfortunately, they're not going away — they are going to scatter."

If you have tips or insights on this topic, please contact SecurityFocus. (news-editor@securityfocus.com)

FTC persuades court to shutter rogue ISP (http://www.securityfocus.com/news/11552/1)

ODShowtime
06-05-2009, 06:09 PM
It's rare to hear the FTC doing something useful so hats off to them. They need to hunt down the spammers and botnet masters and put some bullets in some domes.

standin
06-06-2009, 02:53 PM
FTC does quite a bit. It's just not something that gets promoted by business and is not so exciting news.

FTC Office of Public Affairs - News Room (http://www.ftc.gov/opa/index.shtml)

Sears Settles FTC Charges Regarding Tracking Software
Sears Failed to Disclose Adequately that Software Collected Consumers’ Sensitive Personal Information
Sears Holdings Management Corporation – owned by Sears, Roebuck and Company and Kmart Management Corporation – has agreed to settle Federal Trade Commission charges that it failed to disclose adequately the scope of consumers’ personal information it collected via a downloadable software application. According to the FTC’s administrative complaint, Sears represented to consumers that the software would track their “online browsing.” The FTC charges that the software would also monitor consumers’ online secure sessions – including sessions on third parties’ Web sites – and collect information transmitted in those sessions, such as the contents of shopping carts, online bank statements, drug prescription records, video rental records, library borrowing histories, and the sender, recipient, subject, and size for web-based e-mails. The software would also track some computer activities that were not related to the Internet. The proposed settlement calls for Sears to stop collecting data from the consumers who downloaded the software and to destroy all data it had previously collected.

According to the FTC’s complaint, Sears invited certain consumers visiting the sears.com and kmart.com Web sites to become members of the “My SHC Community.” Sears solicited these consumers to “participate in exciting, engaging, and on-going interactions – always on your terms and always by your choice.” Sears paid consumers $10 to participate. As part of this process, Sears asked consumers to download “research” software that it said would confidentially track their “online browsing.” Only in a lengthy user license agreement, available to consumers at the end of a multi-step registration process, did Sears disclose the full extent of the information the software tracked, according to the complaint. The complaint charges that Sears’ failure to adequately disclose the scope of the tracking software’s data collection was
deceptive and violates the FTC Act.
But these things have to be reported to be found.

econsumer.gov - Your site for cross-border complaints. (http://www.econsumer.gov/)

https://www.ftccomplaintassistant.gov/

FTC Bureau of Competition - Competition Enforcement (http://www.ftc.gov/bc/enforcement.shtm)

standin
06-06-2009, 03:01 PM
Here is another place to help combat cyber crime.
Shadowserver Foundation - Main - HomePage (http://www.shadowserver.org/wiki/pmwiki.php/Main/HomePage)

The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation to improve the security of the Internet by raising awareness of the presence of compromised servers, malicious attackers, and the spread of malware.

The Shadowserver Foundation is responsible for:

http://www.shadowserver.org/wiki/uploads/Shadowserver/flow4.gif

-Capturing and receiving malicious software, or information related to compromised devices
-Disassembling, sandboxing, and analyzing viruses and trojans
-Monitoring and reporting on malicious attackers
-Tracking and reporting on botnet activities
-Disseminating cyber threat information
-Coordinating incident response

The Shadowserver Foundation works alongside other security agencies to develop strategies against the threats and to form action plans to help mitigate the threats as they develop.

GAR
06-06-2009, 03:21 PM
They need to hunt down the spammers and botnet masters and put some bullets in some domes.

The reason they do not is because US intelligence has been doing the same thing internationally for over 40 years.

standin
06-07-2009, 06:05 AM
<object width="660" height="525"><param name="movie" value="http://www.youtube.com/v/OydnLnW1mH4&hl=en&fs=1&color1=0xe1600f&color2=0xfebd01&border=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/OydnLnW1mH4&hl=en&fs=1&color1=0xe1600f&color2=0xfebd01&border=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="660" height="525"></embed></object>