DOJ charges seven in massive clickjacking scheme

The Justice Department is indicting seven individuals with hijacking more than 4 million computers across 100 countries

The U.S. Department of Justice is charging seven individuals with 27 counts of wire fraud and other computer-related crimes, alleging that the group hijacked four million computers across 100 countries in a sophisticated clickjacking scheme.

The DOJ is holding a press conference in New York at 1 p.m. to reveal further details of the indictment, which has been filed in the U.S. District Court of New York.

[ Learn how to secure your systems with InfoWorld's Malware Deep Dive PDF special report and Security Central newsletter, both from InfoWorld. ]

According to the indictment, the defendants had set up a phony Internet advertising agency, entering into agreements with online ad providers that would pay the group whenever its ads where clicked on by users. The group's malware, which they had planted on millions of user computers, would redirect the computers' browsers to its advertisements, thereby generating illicit revenue.

The malware worked by capturing and altering the results of a user's search engine query. A user would search for a popular site, such as ones for Netflix, the Wall Street Journal, Amazon, Apple iTunes, and the U.S. Internal Revenue Service. Whenever the user would click on the provided link, however, the browser would be redirected to another website, one that the group was paid to generate traffic for.

The malware they used also blocked antivirus software updates, which left users vulnerable to other attacks as well, according to the DOJ.

Six of the defandants resided in Estonia during the operation, which took place from 2007 to 2011. They were Vladimir Tsastsin, Timur Gerassimenko, Dmitri Jegorow, Valeri Aleksejev, Konstantin Poltev and Anton Ivanov The seventh defendant, Andrey Taame, resided in Russia.

The six Estonian defendants have been arrested by the Estonian police and the U.S. is seeking to extradite them. Taame remains at large, said Preet Bharara, United States attorney for the Southern District of New York, in a press conference held in New York. The DOJ filed the indictment in the U.S. District Court of New York. Each defendant is charged with five counts of wire fraud and computer intrusion crimes, and Tsastsin is charged with 22 additional counts of money laundering.

The DOJ estimated that the group generated more than $14 million through its illicit scheme. At least 500,000 of the computers infected are in the U.S.

The malware network first came to the DOJ's attention through NASA, which had more than 130 computers running the malware, according to NASA Inspector General Paul Martin, who also spoke at the press conference. While NASA continues to investigate the malware, the agency does not think that any of its critical operational systems were compromised by this software, Martin said.

In order to redirect browser requests, the group set up rogue DNS (Domain Name System) servers, located in data centers in New York and Chicago. "The malware changed the DNS settings so the infected computers' [requests for website addresses] were routed not to legitimate DNS servers but to DNS rogue servers operated by the defendants," Bharara said. "The defendants' plan was to infect computers, direct them to servers they controlled, then redirect traffic to unintended websites, and reap a financial windfall from this redirected traffic."

Some of the website redirections were to websites of legitimate businesses, such as H&R Block's. In these cases, such businesses, assuming they were paying for legitimate services to boost traffic, were "unwitting victim[s] in the fraud," Bharara said. In addition to redirecting browser requests to alternate sites, the malware also replaced legitimate advertisements at sites like ESPN with ads that generated revenue for the group, also by using the rogue DNS servers.

The Federal Bureau of Investigation has dismantled the group's network, replacing its DNS servers with clean ones so that user disruption would be minimized. The FBI also provided Internet service providers with lists of which of their customers had the malware. The agency also set up a Web page with instructions on how to cleanse computers of the malicious software.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is Joab_Jackson@idg.com

Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies