Brian Sims
Editor |
Cyber crime site selling hacking tool taken down
05 December 2019
A website which sold a hacking tool purchased by cyber criminals in 124 countries and gave full remote control of victims’ computers has been taken down following an international investigation.
14,500 people across the world purchased the Imminent Monitor Remote Access Trojan (IM RAT) from https://imminentmethods.net for as little as $25USD.
Once covertly installed on a victim’s computer, IM RAT allowed the hacker full access to the infected device, enabling them to disable anti-virus software, steal data or passwords, record key strokes and watch victims via their webcams.
The international operation was led by the Australian Federal Police (AFP) with the North West Regional Organised Crime Unit (NWROCU) leading the UK investigation with UK activity coordinated and supported by the National Crime Agency (NCA). On Monday 25 November an international week of action commenced with enforcement activity taking place across nine countries targeting sellers and users of the tool.
21 search warrants were executed across the UK, in Greater Manchester, Merseyside, Milton Keynes, Hull, London, Leeds, Walsall, Lancashire, Nottingham, Surrey, Essex and Somerset.
All targeted suspected users of the RAT. Those warrants lead to the recovery of more than 100 exhibits and 14 people arrested or interviewed on suspicion of offences contrary to the Computer Misuse Act.
Europe-wide there were 85 warrants executed, with more than 400 items seized.
Australian police effected a takedown of https://imminentmethods.net on the morning of Friday November 29th. Subsequently, the IM RAT tool can no longer be used by those that bought it.
Phil Larratt from the NCA said: “Working with the NWROCU, AFP and a range of international and European partners we were able to support the takedown of a website that was distributing malware and facilitating hacking offences.
“The IM RAT was used by individuals and organised crime groups in the UK to commit a range of offences beyond just the Computer Misuse Act, including fraud, theft and money laundering.
“Cyber criminals who bought this tool for as little as $25 were able to commit serious criminality, remotely invading the privacy of unsuspecting victims and stealing sensitive data.
“As part of Team Cyber UK, the NCA works with a wide range of law enforcement, government and private sector partners to affectively disrupt and deter this type of criminal activity.”
Chief Constable Andy Cooke, QPM, national lead for crime, said: “Cyber Crime is increasingly part of the serious and organised crime landscape and this example of international coordinated law enforcement activity shows the UK’s absolute commitment to tackling and undermining this constantly evolving threat.”
Detective Inspector Andy Milligan from the NWROCU said: “The illicit use of IM RAT is akin to a cyber burglary, with criminals stealing data, including images and movies, secretly turning on web cams, monitoring key strokes and listening in to people’s conversations via computer microphones.
“Cyber Crime is not an anonymous victimless crime as some believe. There are real world consequences to people’s actions in cyber space and the international activity this week has shown how serious the UK treats this sort of criminality.
“People should protect themselves by following National Cyber Security Centre (NCSC) advice, ensuring operating systems are always up to date, that they use anti-virus and they don’t click on links or attachments in suspicious emails."
NCSC guidance is available at https://www.ncsc.gov.uk/
- Environment Agency and Fire Service team up
- Fire Sector Federation calls for change
- Action to combat online fraud must favour customers
- NCAB Group set to run webinar entitled ‘Learn About UL’
- Javid promises support for Police frontline
- Series of Derbyshire arson attacks leads to sentencing of teenager
- HMRC stops fraudsters and saves public over £2.4M
- Brigade calls for installation of sprinklers
- Counter-terror policing awarded extra funding for Parsons Green response
- CLC publishes updates focused on COVID-19 site operating procedures
- No related articles listed