US catches Chinese man allegedly behind ‘world’s largest botnet’

US catches Chinese man allegedly behind ‘world’s largest botnet’

08:12 AM June 04, 2024

The United States caught the suspected mastermind of the world’s largest botnet. On May 24, 2024, US authorities arrested Yunhe Wang, the alleged leader of the 911 S5 botnet.

The Department of Justice said this network of unsuspecting devices facilitated various cybercrimes, such as fraud and child exploitation. 

READ: OpenAI says it stopped AI influence operations

Article continues after this advertisement

The DOJ says Wang generated $99 million from his scheme. His scheme spanned IP addresses across 190 countries and operated for eight years. 

FEATURED STORIES

What is a botnet?

This represents the mastermind behind the world's largest botnet.
Free stock photo from Pexels

Understanding what a botnet is is important before delving into the world’s largest one. Cybersecurity solutions firm Kaspersky defines the word “botnet” as a portmanteau of the words “robot” and “network.” 

It is a “network of hijacked computer devices used to carry out various scams and cyberattacks.” In other words, botnets infiltrate computers, take over, and turn those compromised devices into a network for various online schemes. 

Article continues after this advertisement

The cybersecurity company says they follow these basic stages:

Article continues after this advertisement
  1. Prep and Expose: A hacker or a group exploits a vulnerability to expose users to malware. 
  2. Infect: Hackers infect user devices with malware to take control.
  3. Activate: Hackers mobilize infected devices to carry out attacks. 

Online criminals use a bot herder in the Activate Stage. It is a program that uses command programming to operate the network of infected computers for various schemes:

Article continues after this advertisement
  • Stealing money from online accounts
  • Accessing confidential accounts
  • Sabotaging websites and services
  • Mining cryptocurrencies
  • Providing information to other cybercriminals

How did the 911 S5 botnet get caught?

Matthew Axelrod, the Assistant Secretary for Export Enforcement at the U.S. Department of Commerce’s Bureau of Industry and Security, explained how 911 S5 worked: 

“The conduct alleged here reads like it’s ripped from a screenplay,” he said in a report from UK-based news firm The Independent.

Article continues after this advertisement

“A scheme to sell access to millions of malware-infected computers worldwide, enabling criminals all over the world to steal billions of dollars, transmit bomb threats, and exchange child exploitation materials – then using the scheme’s nearly $100 million in profits to buy luxury cars, watches, and real estate.”

Yunhe Wang allegedly sold access to his network of compromised computers to criminals. Then, these people used it to bypass fraud detection systems to steal billions of dollars from financial institutions. 

“What they don’t show in the movies though is the painstaking work it takes by domestic and international law enforcement, working closely with industry partners, to take down such a brazen scheme and make an arrest like this happen,” Axelrod added.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

US Attorney General Merrick Garland explained law enforcement agencies worldwide collaborated to identify, locate, and apprehend Wang. The Independent says he faces a maximum penalty of 65 years in prison if convicted.

TOPICS: technology
TAGS: technology

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.