Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A former information security engineer had operated the Kelihos botnet, the primary distribution system for the MacDefender malware, Microsoft says.
Microsoft alleged Andrey Sabelnikov, a Russian citizen and former security vendor staffer, was responsible operations of the botnet.
The Redmond giant took down Kelihos in September.
Microsoft Digital Crimes Unit senior attorney Richard Boscovich said it presented to court evidence that Sabelnikov wrote the code for and either created, or participated in creating, the Kelihos malware.
“Further, the complaint alleges that he used the malware to control, operate, maintain and grow the Kelihos botnet. These allegations are based on evidence Microsoft investigators uncovered while analysing the Kelihos malware," Boscovich said.
Microsoft alleged Sabelnikov registered more than 3,700 cz.cc subdomains from Dominique Alexander Piatti and dotFREE Group SRO, and used them to operate Kelihos.
Charges against against Alexander PiattiPiatti and dotFREE Group were settled and dismissed last year.
It was also revealed that Sabelnikov worked as a software engineer and project manager at Russian anti-virus firm Agnitum, a provider of firewalls, anti-virus and security software.
Microsoft doesn't specify where Sabelnikov worked, but security blogger Brian Krebs pointed out that Sabelnikov's LinkedIn page said he worked at the company from 2005 to 2007.
Krebs said that Sabelnikov's alleged role was discovered after a security researcher obtained a copy of the source code to Kelihos, who noticed it contained debug code that downloaded a Kelihos malware installer from the domain sabelnikov.net, a photography site registered to Sabelnikov's name.
That site currently links to Sabelnikov's profile page at Russian social networking site Vkontakte.ru, which includes the same pictures found in the LinkedIn profile.
Despite the takedown, Boscovich said that thousands of computers remain infected and that the case "is not over".
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.