Last month, the Norwegian police arrested five men in a joint effort with Europol as part of the OP Falling sTAR. Very little is known about the details of the operation and who and what these miscreants did, but Norway’s Kripos national criminal investigation service noted that they were charged with possessing, using and selling malware, including RATs (Remote Access Trojans).
[su_note note_color=”#ffffcc” text_color=”#00000″]Loucif Kharouni, Sr Threat Researcher at Damballa :
Damballa’s Threat Discovery Center worked in cooperation with the Norwegian police over the last few months to track and identify the author of the malware called MegalodonHTTP. We published a blog about MegalodonHTTP in November where we exposed the heart of the malware and how and where it’s sold.
We are not at liberty to divulge the MegalodonHTTP author’s real identity, but we can confirm that the person behind the handle Bin4ry is no longer active or doing business.[/su_note]
[su_box title=”About Damballa” style=”noise” box_color=”#336588″]As a leader in automated breach defence, Damballa delivers advanced threat protection and containment for active threats that bypass all security prevention layers. Born for breach defence, Damballa rapidly discovers infections with certainty, pinpointing the compromised devices that represent the highest risk to a business, and enabling prioritized response and refocusing of security experts to the areas of greatest risk to an enterprise. Our patented solutions leverage Big Data from one-third of the worlds Internet traffic, combined with machine learning, to automatically discover and terminate criminal activity, stop data theft, minimize business disruption, and reduce the time to response and remediation. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world’s largest ISP and telecommunications providers.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.