SlideShare uma empresa Scribd logo
1 de 7
Suspected ‘Black Hole’ Hacker Arrested
Facebook.com/storetec
Storetec Services Limited
@StoretecHull www.storetec.net
A man suspected of being the hacker behind the Black Hole malware
virus has been arrested in Russia.
The individual, who was being pursued by Europol, is believed to be
the man using the alias Paunch, who created the Blackhole and
Cool exploit kits. These were sold to cyber criminals in order to
infest web users with malware.
A Europol spokesperson said: "Europol and the European Cybercrime
Centre has been informed that a high-level suspected cyber criminal
has been arrested.
"We can only refer you to the Russian authorities, they are the ones
who should speak about this topic."
However, as yet there has been no confirmation from Russia about the
details.
The Black Hole was invented in 2010 and was particularly prominent in
2012 and 2013, copying malicious software to legitimate sites, which
then found its way into users' computers. It also created links in spam
emails that linked to sites created specifically to infect PCs.
As a result, computers could be infected by viruses like data-stealing
trojans and key loggers that track what is being typed.
Fraser Howard, a researcher at the anti-virus company Sophos, told
the BBC that these kits have since been usurped by others from
different hackers, like Sweet Orange and Neutrino. The kits made by
Paunch dropped from causing 28 per cent of infections dealt with by
Sophos in August 2012 to only four per cent in the same month this
year.
What this means for companies concerned about their data protection
is that the arrest of Paunch – if indeed the authorities have got the right
man – does not mean the end of the threat by any means. There will
still be many other hackers out there, so backing up data remotely from
the infrastructure that may come under cyber attack remains an
important step firms should take.
Instances of large-scale attacks by hackers have been going on for
many years, with previous examples including the Melissa Virus, which
was spread through emails in 1999 and the early 2000s.
Its creator, David Smith, was sentenced to 20 months in jail following
his conviction in 2002.
Storetec News/Blogs."http://www.storetec.net/news-blog/suspected-
black-hole-hacker-arrested/". Suspected ‘Black Hole’ Hacker Arrested.
October 9, 2013. Storetec.
Its creator, David Smith, was sentenced to 20 months in jail following
his conviction in 2002.
Storetec News/Blogs."http://www.storetec.net/news-blog/suspected-
black-hole-hacker-arrested/". Suspected ‘Black Hole’ Hacker Arrested.
October 9, 2013. Storetec.

Mais conteúdo relacionado

Mais procurados

virus_11-24
virus_11-24virus_11-24
virus_11-24
Uskidz
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
Mohamed Omar
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 

Mais procurados (16)

virus_11-24
virus_11-24virus_11-24
virus_11-24
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACT
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 

Destaque (9)

flood_scenario
flood_scenarioflood_scenario
flood_scenario
 
1. золотые страницы истории
1. золотые страницы истории1. золотые страницы истории
1. золотые страницы истории
 
A. Mosca - L’Istat, il Sistema statistico nazionale e quello europeo
A. Mosca - L’Istat, il Sistema statistico  nazionale e quello europeoA. Mosca - L’Istat, il Sistema statistico  nazionale e quello europeo
A. Mosca - L’Istat, il Sistema statistico nazionale e quello europeo
 
Redes
RedesRedes
Redes
 
Chem II Day I
Chem II Day IChem II Day I
Chem II Day I
 
Maria alice doria_aspectos_socioambientais_igef2013
Maria alice doria_aspectos_socioambientais_igef2013Maria alice doria_aspectos_socioambientais_igef2013
Maria alice doria_aspectos_socioambientais_igef2013
 
Presentación_UD_segundo_ciclo
Presentación_UD_segundo_cicloPresentación_UD_segundo_ciclo
Presentación_UD_segundo_ciclo
 
Smirnoff
SmirnoffSmirnoff
Smirnoff
 
La obra de erick erikson
La obra de erick eriksonLa obra de erick erikson
La obra de erick erikson
 

Semelhante a Suspected ‘black hole’ hacker arrested

Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
anbersattar
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 

Semelhante a Suspected ‘black hole’ hacker arrested (20)

External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Nov
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Secureview 4 - 2010
Secureview 4 - 2010Secureview 4 - 2010
Secureview 4 - 2010
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 

Mais de John Davis

Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
John Davis
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
John Davis
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
John Davis
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
John Davis
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
John Davis
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
John Davis
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
John Davis
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
John Davis
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
John Davis
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass fa
John Davis
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
John Davis
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
John Davis
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
John Davis
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
John Davis
 

Mais de John Davis (20)

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass fa
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Suspected ‘black hole’ hacker arrested

  • 1. Suspected ‘Black Hole’ Hacker Arrested Facebook.com/storetec Storetec Services Limited @StoretecHull www.storetec.net A man suspected of being the hacker behind the Black Hole malware virus has been arrested in Russia. The individual, who was being pursued by Europol, is believed to be the man using the alias Paunch, who created the Blackhole and Cool exploit kits. These were sold to cyber criminals in order to infest web users with malware.
  • 2. A Europol spokesperson said: "Europol and the European Cybercrime Centre has been informed that a high-level suspected cyber criminal has been arrested. "We can only refer you to the Russian authorities, they are the ones who should speak about this topic."
  • 3. However, as yet there has been no confirmation from Russia about the details. The Black Hole was invented in 2010 and was particularly prominent in 2012 and 2013, copying malicious software to legitimate sites, which then found its way into users' computers. It also created links in spam emails that linked to sites created specifically to infect PCs.
  • 4. As a result, computers could be infected by viruses like data-stealing trojans and key loggers that track what is being typed. Fraser Howard, a researcher at the anti-virus company Sophos, told the BBC that these kits have since been usurped by others from different hackers, like Sweet Orange and Neutrino. The kits made by Paunch dropped from causing 28 per cent of infections dealt with by Sophos in August 2012 to only four per cent in the same month this year.
  • 5. What this means for companies concerned about their data protection is that the arrest of Paunch – if indeed the authorities have got the right man – does not mean the end of the threat by any means. There will still be many other hackers out there, so backing up data remotely from the infrastructure that may come under cyber attack remains an important step firms should take. Instances of large-scale attacks by hackers have been going on for many years, with previous examples including the Melissa Virus, which was spread through emails in 1999 and the early 2000s.
  • 6. Its creator, David Smith, was sentenced to 20 months in jail following his conviction in 2002. Storetec News/Blogs."http://www.storetec.net/news-blog/suspected- black-hole-hacker-arrested/". Suspected ‘Black Hole’ Hacker Arrested. October 9, 2013. Storetec.
  • 7. Its creator, David Smith, was sentenced to 20 months in jail following his conviction in 2002. Storetec News/Blogs."http://www.storetec.net/news-blog/suspected- black-hole-hacker-arrested/". Suspected ‘Black Hole’ Hacker Arrested. October 9, 2013. Storetec.