Police investigating botnet attacks on UK government
Security vendor Finjan says that a huge Ukrainian botnet has affected corporate and government computers in the UK.
The Metropolitan Police is investigating claims that a botnet made up of two million infected computers has hit UK computers, including ones found in corporate and government departments.
The Police Central e-crime Unit is on the case and the investigation was ongoing, the Met has confirmed.
The botnet is said to have compromised 77 government-owned domains from the UK, US and other countries.
Finjan's Malicious Code Research Centre (MCRC) discovered the network in investigations of command and control servers operated by cyber criminals.
Finjan said that the cyber crime server has been in use since this February, and was hosted in the Ukraine.
The malware on the computers allows cybercriminals to execute commands on end user computers.
In addition to contacting the police, Finjan said it had contacted the affected government agencies.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The Cabinet Office, which plays a role in guiding and setting standards for the use of IT in government, had not responded to our request for comment at time of publication.
However, in a statement to the BBC, a spokesman said it would not comment on specific attacks and that it was not government policy to confirm if an individual organisation had been subject to one.
-
Global IT spending set to exceed $6 trillion in 2026News Several key areas are expected to drive the bulk of investment next year
-
Data engineers have never been more important, as businesses are starting to find outNews An MIT survey for Snowflake shows the changing role of data engineers – and their rise in influence
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up stingNews Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
-
Horabot campaign targeted businesses for more than two years before finally being discoveredNews The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
-
Brand-new Emotet campaign socially engineers its way from detectionNews This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomwareNews The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
-
UK police fails ethical tests with "unlawful" facial recognition deploymentsNews A University of Cambridge team audited UK police use of the tech and found frequent ethical and legal shortcomings
-
Beating the bad bots: Six ways to identify and block spam trafficIn-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against RussiaNews The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
-
Microsoft's secure VBA macro rules already being bypassed by hackersNews Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware