INDIA: In a latest update, a law enforcement operation led by Europol, with assistance from Symantec, Microsoft and other industry partners, seized servers and infrastructure from the cybercrime group behind the Ramnit botnet. Symantec informs it provided technical analysis and telemetry as part of the investigation.
During its five years of operation, the Ramnit botnet (detected by Symantec as W32.Ramnit.B) has evolved into a major criminal enterprise, infecting more than 3.2 million computers and harvesting banking credentials, passwords, cookies, and personal files from victims. Ramnit has affected victims across the world and infections have been found in most countries, the update added.
However, the worst affected countries in recent times have been India with 27 per cent; Indonesia with 18 per cent, Vietnam with 12 per cent and Bangladesh with nine per cent.
This botnet provides attackers with multiple ways to defraud a victim once their computer is compromised. It is capable of monitoring their web browsing sessions and stealing banking credentials. It can steal website cookies allowing attackers to impersonate the victim, take files from the victim’s hard disk, and grant the attackers remote access to the computer, allowing them to exfiltrate stolen information or download additional malware.
While the amount of infected computers has decreased over time, the Ramnit botnet is still very active. For example, Symantec blocked a daily average of around 6,700 new infections in November 2014. This was down from a daily average of 8,000 in May 2014.