We've updated our Privacy and Cookies Policy
We've made some important changes to our Privacy and Cookies Policy and we want you to know what this means for you and your data.
Blackhole malware exploit kit suspect arrested
Russian police have reportedly arrested a man on suspicion of masterminding two infamous hacking tools.
He is suspected of being the man behind the alias Paunch - the nickname used by the creator of the Blackhole and Cool exploit kits, sold to cybercriminals to infect web users with malware.
The Russian authorities have not confirmed the details.
But security firms said they had already detected a decline in the programs' use.
A spokesman for the law enforcement agency Europol told the 大象传媒: "Europol and the European Cybercrime Centre has been informed that a high-level suspected cyber criminal has been arrested.
"We can only refer you to the Russian authorities, they are the ones who should speak about this topic."
The Russian police's press office said it had nothing to add at this time.
However, Alexander Gostev, chief security expert at the Moscow-based internet protection provider Kaspersky Lab, said the arrest had been confirmed to him by "anonymous sources".
Spreading malware
The Blackhole kit, released in 2010, dominated the crimeware market throughout 2012 and the start of 2013, according to Fraser Howard, a researcher at the anti-virus company Sophos.
He said the code had been sold for an annual licence of $1,500 (拢940) or could be rented from its creator for $200 (拢125) for one week's use, among other price plans.
The software targeted a range of vulnerabilities in the Java programming language, Adobe's Flash media player, Windows software and PDF files.
It had two ways of doing this:
- adding malicious code to hundreds of thousands of legitimate websites, which then copied malware to visitors computers
- creating links in spam messages to specially created sites that infected PCs
Among the malware downloaded was:
- fake anti-virus software that falsely claimed the PC was infected and urged the user to pay a fee to remove viruses
- Trojans that attempted to steal financial records stored on the PC
- the ZeroAccess rootkit, which downloaded other software that hijacked the PC for use in a botnet - a facility used to overwhelm websites with traffic and force them offline
- key loggers that took a record of what was typed on the PC
- ransomware that attempted to blackmail the PC owner
Although Mr Howard said Blackhole was once the biggest threat of its kind, he added that in recent months it had been overshadowed by rival kits, including Sweet Orange and Neutrino.
According to the researcher, the Blackhole and Cool kits put together were only involved in about 4% of all malware detected by Sophos in August, down from 28% the previous year.
The figure had since dropped to 2% in recent days, he added.
Another independent security blogger stressed that the arrest was still significant.
"If it's true that the brains behind the Blackhole has been apprehended it's a very big deal - a real coup for the cybercrime-fighting authorities, and hopefully cause disruption to the development of one of the most notorious exploit kits the web has ever seen," .
"However, it's worth remembering that nature abhors a vacuum, and there would surely be other online criminals waiting to take their place, promoting their alternative exploit kits and malicious code."
Mikko Hypponen, chief research officer at F-Secure, agreed.
"If indeed it is Paunch that they arrested, that is a major arrest - he is a big deal," he told the 大象传媒.
"He was clearly the biggest player in providing exploit kits - not just by selling them, but also renting and leasing them to online criminals.
"Both Blackhole and its successor Cool have been very popular.
"Users didn't have to be very technical to operate them - there was a manual that came with them - they just had to get them running and be able to break into a high-profile website, or create a new one from scratch, to install something bad on your computer."
Top Stories
More to explore
Most read
Content is not available