• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 20th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Crime
Scams and Fraud

European Cyber Police Shuts Down World’s Biggest “Ramnit” Botnet

March 3rd, 2015 Waqas Cyber Crime, Malware, Scams and Fraud, Security 0 comments
European Cyber Police Shuts Down World’s Biggest “Ramnit” Botnet
Share on FacebookShare on Twitter

In a joint operation cyber police from United Kingdom, Netherlands, Germany and Italy have claimed successful breakdown of what can be the world’s biggest ever botnets known as Ramnit.

The Ramit malware is so dangerous that according to researchers it has compromised more than 3.2 million Microsoft Windows based PCs, and still active in 350,000 computers worldwide.

Ramit malware steals banking details such as login data and passwords from victim’s PC.

european-cyber-police-shuts-down-worlds-biggest-ramnit-botnet-5

The lethal malware was first identified by Symantec, Microsoft and an IT security company Anubis Networks; who further reported it to law enforcement agencies in Europe. The Europol with the help of European Cybercrime Centre (EC3) then destroyed and shutdown the command and control servers for the malware.

Related Post: MS Word’ Malicious Macro Downloads Vawtrak Banking Trojan

Cyber criminals behind Ramnit malware were using more than 300 domains worldwide to control compromised computers.

Good news is that those users infected with this malware will be automatically cut off from the servers. Ramnit mostly infected users from Indonesia, India, Vietnam, US, Brazil. Turkey, Egypt and Philippines.

european-cyber-police-shuts-down-worlds-biggest-ramnit-botnet-4

An important lesson to learn here is NEVER to click links attached with malicious emails, as the Ramnit malware was also spread via emails from unknown senders and social media messages. Once infected, it would takeover the device and steal login details such as bank account numbers, steal session cookies, passwords from online banking sites, shutdown anti-virus programs and spy on user’s activity on the internet.

Related Post: Android Trojan Virus: iBanking Malware ‘Qadars’ Targets Facebook Users via Webinjects

european-cyber-police-shuts-down-worlds-biggest-ramnit-botnet-3

Capabilities of Ramnit Botnet via Symantec (Click to Enlarge)

Symantec found out that the cyber criminals who created Ramnit malware were using it for last five years.

“The group has been in operation for at least five years and in that time has evolved into a major criminal enterprise, infecting more than 3.2 million computers in total and defrauding large numbers of innocent victims. It is hoped that today’s operation will strike a significant blow against the resources and capabilities of the gang,” according to Symantec.

Ramnit infographic from Symantec

Ramnit infographic from Symantec

We at HackRead have always told our readers to beware of phishing emails, never click any suspicious link sent from unknown senders and always go through online forums before opening a link or clicking a .exe file.

For now, you can scan your computer for Ramnit and remove it by using Microsoft’s or Symantec’s virus scanner tools. Follow @HackRead

  • Tags
  • Banking
  • Botnet
  • Cyber Crime
  • europe
  • Finance
  • hacking
  • Malware
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Microsoft Outlook Users Targeted with Account Termination Phishing Scam
Next article Stop!t: An App for Kids To Report Cyberbullies With Push of A Button
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes says it was also breached by SolarWinds hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

22
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

47
Malwarebytes says it was also breached by SolarWinds hackers
Hacking News

Malwarebytes says it was also breached by SolarWinds hackers

60

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us