Blackshades

Blackshades
Type Trojan horse
Subtype Remote administration trojan
Isolation c.2010[1]
Author(s) Alex Yücel and Michael Hogue[1]
Operating system(s) affected Windows

Blackshades is the name of a malicious trojan horse used by hackers to control computers remotely. The malware targets computers using Microsoft Windows -based operating systems.[2] According to US officials, over 500,000 computer systems have been infected worldwide with the software.[3]

In 2014, the United States Federal Bureau of Investigation (FBI) arrested one hundred people who had Blackshades in their computer. Before the FBI crackdown, Blackshades was sold for US$40, and reportedly generated US$350,000 in sales.[1]

Functionality

Blackshades infects computer systems by downloading onto a victim's computer when the victim accesses a malicious webpage (sometimes downloading onto the victim's computer without the victim's knowledge, known as a drive-by download) or through external storage devices, such as USB flash drives.[4] Blackshades also included tools that assisted hackers in maximizing the amount of computer systems infected, such as a tool that sends infected links that masquerade as an innocuous site to other potential victims via the victim's social networking service.[1]

Blackshades can reportedly be used remotely to access an infected computer without authorization. Blackshades allows hackers to perform many actions on an infected computer remotely without authorization, including the ability to:[1][5]

Blackshades reportedly can be used by computer hackers with little experience or by script kiddies, hackers that use programs developed by others to attack computer systems.[1]

Blackshades can also act as ransomware. Hackers using Blackshades can restrict access to the victim's computer and demand a ransom paid to the hacker in order for the restriction to be lifted.[5]

Detection and removal

Many antivirus programs can successfully detect and remove Blackshades, however hackers using the Blackshades software usually avoid detection of Blackshades infections by using software that obfuscates the Blackshades binary to avoid detection by antivirus programs, which the Blackshades organization also sold along with the Blackshades software.[5][6]

Blackshades in the media

In 2012, Citizen Lab and EFF reported on the use of Blackshades to target opposition forces in Syria.[7]

In 2015, Stefan Rigo from Leeds was given a 40-week suspended sentence for using BlackShades against 14 people, 7 of whom he knew personally. It is reported he paid for the software using his ex-girlfriend's payment card.[8]

FBI crackdown

In 2012, the FBI ran a sting operation called "Operation Card Shop", which led to 24 arrests of hackers in eight countries. One of those arrested was Michael Hogue (also known as xVisceral in online hacking communities). Hogue, a co-creator of Blackshades, was arrested and indicted on charges under 18 U.S.C. § 1030, more commonly known as the Computer Fraud and Abuse Act. He was sentenced to 20 years in prison.[4][9]

In 2014, the FBI coordinated a worldwide operation to combat the use of the malware, leading to the arrest of almost one hundred people in nineteen countries.[3] On May 19, charges were laid in the United States against five individuals: two men identified as developers of Blackshades and three other men who sold the software or used it to infiltrate other people's computers.[10] Exactly 359 searches were conducted and more than 1,100 electronic devices have been seized as part of the operation.[10] According to the FBI, over 500,000 computers in more than 100 countries were infected by the malware.[11] Blackshades sold typically for US$40, and reportedly generated US$350,000 in sales.[1]

References

  1. 1 2 3 4 5 6 7 "Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce Charges In Connection With Blackshades Malicious Software That Enabled Users Around The World To Secretly And Remotely Control Victims' Computers". United States Department of Justice. May 19, 2014. Retrieved December 13, 2014.
  2. "Could your Computer be Infected by Blackshades?". FBI. Retrieved May 20, 2014.
  3. 1 2 "BlackShades: Arrests in computer malware probe". BBC News. 2014-05-19. Retrieved 19 May 2014.
  4. 1 2 Loyd, Jordan (June 19, 2012). "U.S. v. Michael Hogue Complaint" (PDF). United States Department of Justice.
  5. 1 2 3 Kujawa, Adam (June 15, 2012). "You Dirty RAT! Part 2 – BlackShades NET". Malwarebytes UNPACKED. Malwarebytes Corporation. Retrieved December 31, 2014.
  6. Hoffman, Patrick (May 16, 2014). "U.S. v. Brendan Johnston Complaint 14 Mag 1086" (PDF). United States Department of Justice. p. 8.
  7. Marquis-Boire, Morgan; Hardy, Seth (June 19, 2012). "Syrian Activists Targeted with Blackshades Spy Software".; Marquis-Boire, Morgan; Galperin, Eva (July 12, 2012). "New Malware Targeting Syrian Activists Uses Blackshades Commercial Trojan".
  8. Rigo, Stefan (October 8, 2015). "Webcam hacker spied on sex acts with BlackShades malware - BBC News".;
  9. "Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of International Cyber Crime Takedown". The United States Attorney Office for the Southern District of New York.
  10. 1 2 "BlackShades malware bust ends in nearly 100 arrests worldwide". CBS Interactive. May 19, 2014. Retrieved 20 May 2014.
  11. "More than half million computers worldwide infected with BlackShades malware". Big News Network. Retrieved May 20, 2014.

External links

This article is issued from Wikipedia - version of the 7/28/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.