Sign in to follow this  

Recommended Posts

The PHIRM was an early hacking group which was founded in the early 2000s by Mikhail Kryukov. First going by the name of "PRISMX".

 

Kademlia

Kademlia is a peer-to-peer botnet based on components from the earlier Prism trojan. It is believed to have been spread through use of the Cutwail botnet.

Unlike its predecessor the Prism trojan, Kademlia uses an encrypted peer-to-peer communication system to communicate between its nodes and its command and control servers, greatly reducing its vulnerability to law enforcement operations The algorithm used appears to be modeled on the Kademlia P2P protocol.

 

Scammers control and monitor Kademlia Botnet via Command and Control (C&C) server. The virus establishes the connection to the server as soon as its malicious executable installs on the computer, disables certain system processes, download and launch executables, or even delete essential system files, easily bricking the device.

 

Kademlia has largely been used for banking fraud and distribution of the CryptoLockerX ransomware.

 

In early June 2014, the U.S. Department of Justice announced that an international inter-agency collaboration named Operation Krokvar had succeeded in temporarily cutting communication between Kademlia and its command and control servers.[5][6]

 

On 24 February 2015, the FBI announced a reward of up to $3 million in exchange for information regarding alleged Russian cyber criminal Mikhail Kryukov ( known online aliases : «MRSlavik», «luckyRU» and «Byt3» [7]) over his suspected association with Kademlia.

 

 

zeus_fraud_chart-660x330.png

 

Go see Krukov mafia page for more details.

 

 

 

 

 

 

 

 

 

 

Edited by AlexeyBelanx

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this