

Photo by Michael Geiger on Unsplash
Federal law enforcement officials have disrupted the infrastructure of the notorious Qakbot malware, a malicious computer code used by cybercriminals to commit ransomware, financial fraud, and other cyber- enabled crimes causing “massive losses” to businesses around the world, including a food distribution company in Southern California, officials announced Tuesday.
Beginning last Friday, law enforcement gained access to the Qakbot botnet, redirected botnet traffic to and through servers controlled by law enforcement, and instructed Qakbot-infected computers to download a Qakbot “uninstall” file that untethered the victim computer from the botnet, according to the U.S. Department of Justice.
During a press conference in downtown Los Angeles, the DOJ also announced the seizure of more than $8.6 million in cryptocurrency in illicit profits.
Dubbed “Operation Duck Hunt” by authorities– a reference to the bot’s name — the takedown represents the largest United States-led financial and technical disruption of a botnet infrastructure leveraged by cybercriminals to commit cyber-enabled criminal activity, the DOJ said.
The operation involved actions in the United States, France, Germany, the Netherlands, the United Kingdom, Romania and Latvia, officials said.
“An international partnership led by Justice Department and the FBI has resulted in the dismantling of Qakbot, one of the most notorious botnets ever, responsible for massive losses to victims around the world,” U.S. Attorney Martin Estrada said.
“Qakbot was the botnet of choice for some of the most infamous ransomware gangs, but we have now taken it out. This operation also has led to the seizure of almost 9 million dollars in cryptocurrency from the Qakbot cybercriminal organization, which will now be made available to victims. My office’s focus is on protecting and vindicating the rights of victims, and this multifaceted attack on computer-enabled crime demonstrates our commitment to safeguarding our nation from harm.”
No further information was released regarding the Southern California company hit by the malware.
We are able to provide high-quality political journalism to you for free thanks to our advertisers. So that you can continue to enjoy HEYSOCAL's in-depth reporting, we ask that you please turn off your ad blocker and come on in, free of charge.
Subscribe to our newsletter for this giveaway and many more. Also, stay in the loop for SoCal news and updates.
Your subscription has been confirmed. You've been added to our list and will hear from us soon.
Your request has been confirmed! We will get in touch with you shortly.