Police investigating botnet attacks on UK government
Security vendor Finjan says that a huge Ukrainian botnet has affected corporate and government computers in the UK.

The Metropolitan Police is investigating claims that a botnet made up of two million infected computers has hit UK computers, including ones found in corporate and government departments.
The Police Central e-crime Unit is on the case and the investigation was ongoing, the Met has confirmed.
The botnet is said to have compromised 77 government-owned domains from the UK, US and other countries.
Finjan's Malicious Code Research Centre (MCRC) discovered the network in investigations of command and control servers operated by cyber criminals.
Finjan said that the cyber crime server has been in use since this February, and was hosted in the Ukraine.
The malware on the computers allows cybercriminals to execute commands on end user computers.
In addition to contacting the police, Finjan said it had contacted the affected government agencies.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The Cabinet Office, which plays a role in guiding and setting standards for the use of IT in government, had not responded to our request for comment at time of publication.
However, in a statement to the BBC, a spokesman said it would not comment on specific attacks and that it was not government policy to confirm if an individual organisation had been subject to one.
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
Samsung Galaxy Tab S10 FE review
Reviews The Tab S10 FE retains the feel and core capabilities of Samsung's high-end S10 tablets, but compromises on the display and the performance
By Stuart Andrews
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones
-
UK police fails ethical tests with "unlawful" facial recognition deployments
News A University of Cambridge team audited UK police use of the tech and found frequent ethical and legal shortcomings
By Rory Bathgate
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones