LX Pontual
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Rapidcreek@reddthat.com to News@lemmy.world · 3 years ago

FBI announces it has dismantled global network of hacked computers used in major fraud scheme

www.cnn.com

external-link
message-square
21
link
fedilink
163
external-link

FBI announces it has dismantled global network of hacked computers used in major fraud scheme

www.cnn.com

Rapidcreek@reddthat.com to News@lemmy.world · 3 years ago
message-square
21
link
fedilink
FBI announces it has dismantled global network of hacked computers used in major fraud scheme | CNN Politics
www.cnn.com
external-link
The FBI and European law enforcement agencies dismantled a massive network of hacked computers that had been used to defraud victims of hundreds of millions of dollars, agencies announced Tuesday.
alert-triangle
You must log in or # to comment.
  • PenIsland@lemmy.world
    link
    fedilink
    arrow-up
    28
    arrow-down
    2
    ·
    3 years ago

    Truth Social?

  • girlfreddy@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    23
    ·
    3 years ago

    Ummm … this is a bit disconcerting. I mean good the gov’t did something, but W O W on their ability to uninstall a program from privately-owned computers.

    “The investigation culminated late last week, when the FBI redirected the botnet’s internet traffic through computer servers controlled by the bureau and then issued commands to some infected computers to uninstall the malicious software.”

    • czech@lemmy.world
      link
      fedilink
      arrow-up
      58
      ·
      3 years ago

      Sounds to me like they hacked the bot net rather than used some universal backdoor into privately owned computers.

      • sebinspace@lemmy.world
        link
        fedilink
        arrow-up
        21
        arrow-down
        1
        ·
        3 years ago

        This is correct. Someone doesn’t know what a C2 is.

        • agent_flounder@lemmy.one
          link
          fedilink
          English
          arrow-up
          8
          ·
          3 years ago

          Command & Control for those that don’t. It’s the mechanism used to control the hacked computers. Back in my day they often used IRC.

        • thefartographer@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          3 years ago

          They got Ritalin up in here???

          • glitch1985@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            3 years ago

            Subzero is where it’s at!

    • 3laws@lemmy.world
      link
      fedilink
      arrow-up
      12
      ·
      3 years ago

      That’s not how any of this works

      • Touching_Grass@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        3 years ago

        Right. Undercover FBI was all like “hey hackers, press alt-f4 to check for hidden agents” and they did and then all the zombie PCs shut down and the FBI all cheered

    • CookieJarObserver@sh.itjust.works
      link
      fedilink
      arrow-up
      7
      ·
      3 years ago

      They probably send the kill command to the bot net, most have one in case the creator gets targeted by its own work…

    • Car@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      7
      ·
      3 years ago

      The FBI has removed malware from personal devices before and will likely continue to unless forbidden to via legislation.

      https://thehill.com/policy/cybersecurity/548082-doj-authorizes-fbi-to-remove-malware-on-computers/

    • SpezCanLigmaBalls@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      6
      ·
      3 years ago

      Ur quite dumb

    • Yeather@lemmy.ca
      link
      fedilink
      arrow-up
      2
      arrow-down
      14
      ·
      3 years ago

      Oh boy can’t wait for this to be used maliciously, assuming it hasn’t already.

      • OldWoodFrame@lemm.ee
        link
        fedilink
        arrow-up
        9
        ·
        3 years ago

        The botnet was the example of “this” being used maliciously, the government stopped it.

        • Yeather@lemmy.ca
          link
          fedilink
          arrow-up
          1
          arrow-down
          3
          ·
          3 years ago

          Meant by the government.

      • gullible@kbin.social
        link
        fedilink
        arrow-up
        6
        ·
        3 years ago

        This is minor compared to the extant cyberattack capacity of the US government. It’s a drop in the bucket. No, a fraction of a drop in the bucket.

      • SheeEttin@lemmy.worldBanned
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 years ago

        This article is literally about it being used maliciously

        • FuglyDuck@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 years ago

          I think they meant the FBI taking it over and not shutting it down.

          • SheeEttin@lemmy.worldBanned
            link
            fedilink
            English
            arrow-up
            4
            ·
            3 years ago

            They took it over to shut it down.

            Which I’m fine with, if they had a warrant or court order or something. A real one, not a FISA court. But generally I don’t think they should do that.

            • FuglyDuck@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              3
              ·
              3 years ago

              I mean… you assume they shut it down. They said they did. 50/50 odds they didn’t give it over to the NSA or CIA or something.

      • PunnyName@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        3 years ago

        You got a malicious bot net?

News@lemmy.world

news@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

Welcome to the News community!

Rules:

1. Be civil

Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.

Obvious biased sources will be removed at the mods’ discretion. Supporting links can be added in comments or posted separately but not to the post body. Sources may be checked for reliability using Wikipedia, MBFC, AdFontes, GroundNews, etc.


3. No bots, spam or self-promotion.

Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source. Clickbait titles may be removed.

Posts which titles don’t match the source may be removed. If the site changed their headline, we may ask you to update the post title. Clickbait titles use hyperbolic language and do not accurately describe the article content. When necessary, post titles may be edited, clearly marked with [brackets], but may never be used to editorialize or comment on the content.


5. Only recent news is allowed.

Posts must be news from the most recent 30 days.


6. All posts must be news articles.

No opinion pieces, Listicles, editorials, videos, blogs, press releases, or celebrity gossip will be allowed. All posts will be judged on a case-by-case basis. Mods may use discretion to pre-approve videos or press releases from highly credible sources that provide unique, newsworthy content not available or possible in another format.


7. No duplicate posts.

If an article has already been posted, it will be removed. Different articles reporting on the same subject are permitted. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.

Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners or news aggregators.

All posts must link to original article sources. You may include archival links in the post description. News aggregators such as Yahoo, Google, Hacker News, etc. should be avoided in favor of the original source link. Newswire services such as AP, Reuters, or AFP, are frequently republished and may be shared from other credible sources.


10. Don't copy entire article in your post body

For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 2.76K users / day
  • 6.2K users / week
  • 11.9K users / month
  • 18K users / 6 months
  • 1 local subscriber
  • 36.5K subscribers
  • 30.6K Posts
  • 700K Comments
  • Modlog
  • mods:
  • rjc@lemmy.world
  • Tenthrow@lemmy.world
  • JonsJava@lemmy.world
  • gedaliyah@lemmy.world
  • 🌱 🐄🌱 @lemmy.world
  • jeffw@lemmy.world
  • enu@lemmy.world
  • BE: 0.19.15
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org