In December 2021, Google filed a civil lawsuit in opposition to two Russian males considered liable for working Glupteba, one of many Internet’s largest and oldest botnets. The defendants, who initially pursued a technique of counter suing Google for tortious interference of their sprawling cybercrime enterprise, later openly supplied to dismantle the botnet in trade for fee from Google. The choose within the case was not amused, discovered for the plaintiff, and ordered the defendants and their U.S. legal professional to pay Google’s authorized charges.
Glupteba is a rootkit that steals passwords and different entry credentials, disables safety software program, and tries to compromise different units on the sufferer community — akin to Internet routers and media storage servers — to be used in relaying spam or different malicious visitors.
Collectively, the tens of 1000’s of techniques contaminated with Glupteba on any given day feed into a variety of main cybercriminal companies: The botnet’s proprietors promote the credential information they steal, use the botnet to put disruptive advertisements on the contaminated computer systems, and mine cryptocurrencies. Glupteba additionally rents out contaminated techniques as “proxies,” directing third-party visitors by the contaminated units to disguise the origin of the visitors.
In June 2022, KrebsOnSecurity confirmed how the malware proxy companies RSOCKS and AWMProxy had been solely depending on the Glupteba botnet for recent proxies, and that the founding father of AWMProxy was Dmitry Starovikov — one of many Russian males named in Google’s lawsuit.
Google sued Starovikov and 15 different “John Doe” defendants, alleging violations of the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, trademark and unfair competitors legislation, and unjust enrichment.
In June, Google and the named defendants agreed that the case would proceed as a nonjury motion as a result of Google had withdrawn its declare for damages — looking for solely injunctive aid to halt the operations of the botnet.
The defendants, who labored for a Russian agency referred to as “Valtron” that was additionally named within the lawsuit, instructed Google that they had been curious about settling. The defendants stated they might probably assist Google by taking the botnet offline.
But the courtroom expressed frustration that the defendants had been unwilling to consent to a everlasting injunction, and on the identical time had been unable to articulate why an injunction forbidding them from partaking in illegal actions would pose an issue.
“The Defendants insisted that they were not engaged in criminal activity, and that any alleged activity in which they were engaged was legitimate,” U.S. District Court Judge Denise Cote wrote. “Nevertheless, the Defendants resisted entry of a permanent injunction, asserting that Google’s use of the preliminary injunction had disrupted their normal business operations.”
While the defendants represented that they’d the flexibility to dismantle the Glupteba botnet, when it got here time for discovery — the stage in a lawsuit the place each events can compel the manufacturing of paperwork and different data pertinent to their case — the legal professional for the defendants instructed the courtroom his purchasers had been fired by Valtron in late 2021, and thus not had entry to their work laptops or the botnet.
The lawyer for the defendants — New York-based cybercrime protection legal professional Igor Litvak — instructed the courtroom he first discovered about his purchasers’ termination from Valtron on May 20, a truth Judge Cote stated she discovered “troubling” given statements he made to the courtroom after that date representing that his purchasers nonetheless had entry to the botnet.
The courtroom in the end suspended the invention course of in opposition to Google, saying there was purpose to consider the defendants sought discovery solely “to learn whether they could circumvent the steps Google has taken to block the malware.”
On September 6, Litvak emailed Google that his purchasers had been keen to debate settlement.
“The parties held a call on September 8, at which Litvak explained that the Defendants would be willing to provide Google with the private keys for Bitcoin addresses associated with the Glupteba botnet, and that they would promise not to engage in their alleged criminal activity in the future (without any admission of wrongdoing),” the choose wrote.
“In exchange, the Defendants would receive Google’s agreement not to report them to law enforcement, and a payment of $1 million per defendant, plus $110,000 in attorney’s fees,” Judge Cote continued. “The Defendants stated that, although they do not currently have access to the private keys, Valtron would be willing to provide them with the private keys if the case were settled. The Defendants also stated that they believe these keys would help Google shut down the Glupteba botnet.”
Google rejected the defendants’ provide as extortionate, and reported it to legislation enforcement. Judge Cote additionally discovered Litvak was complicit within the defendants’ efforts to mislead the courtroom, and ordered him to affix his purchasers in paying Google’s authorized charges.
“It is now clear that the Defendants appeared in this Court not to proceed in good faith to defend against Google’s claims but with the intent to abuse the court system and discovery rules to reap a profit from Google,” Judge Cote wrote.
Litvak has filed a movement to rethink (PDF), asking the courtroom to vacate the sanctions in opposition to him. He stated his objective is to get the case again into courtroom.
“The judge was completely wrong to issue sanctions,” Litvak stated in an interview with KrebsOnSecurity. “From the beginning of the case, she acted as if she needed to protect Google from something. If the court does not decide to vacate the sanctions, we will have to go to the Second Circuit (Court of Appeals) and get justice there.”
In an announcement on the courtroom’s choice, Google stated it’s going to have important ramifications for on-line crime, and that since its technical and authorized assaults on the botnet final 12 months, Google has noticed a 78 p.c discount within the variety of hosts contaminated by Glupteba.
“While Glupteba operators have resumed activity on some non-Google platforms and IoT devices, shining a legal spotlight on the group makes it less appealing for other criminal operations to work with them,” reads a weblog publish from Google’s General Counsel Halimah DeLaine Prado and vp of engineering Royal Hansen. “And the steps [Google] took last year to disrupt their operations have already had significant impact.”