Russian Business Network

From Wikipedia, the free encyclopedia

Jump to: navigation, search

The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the Storm botnet.[1][2][3] The RBN, which is notorious for its hosting of illegal and dubious businesses, originated as an Internet service provider for child pornography, phishing, spam, and malware distribution physically based in St. Petersburg, Russia. By 2007, it developed partner and affiliate marketing techniques in many countries to provide a method for organized crime to target victims internationally.[4]

Contents

[edit] Activities

The RBN has been described by VeriSign as "the baddest of the bad"[5]. It offers web hosting services and internet access to all kinds of criminal and objectionable activities, with individual activities earning up to $150 million in one year[6]. Businesses that take active stands against such attacks are sometimes targeted by denial of service attacks originating in the RBN network.[5] RBN has been known to sell its services to these operations for $600 per month.[4]

The business is difficult to trace. It is not a registered company, and its domains are registered to anonymous addresses. Its owners are known only by nicknames. It does not advertise, and trades only in untraceable electronic transactions.[5]

One increasingly known activity of the RBN is delivery of exploits through fake anti-spyware and anti-malware, for the purposes of PC hijacking and personal identity theft.[7] McAfee SiteAdvisor tested 279 “bad” downloads from this one site, and found that MalwareAlarm is an update of the fake anti-spyware Malware Wiper.[8] The user is enticed to use a “free download” to test for spyware or malware on their PC; MalwareAlarm then displays a warning message of problems on the PC to persuade the unwary web site visitor to purchase the paid version. Along with MalwareAlarm, much other rogue software is linked to and hosted by the RBN.[9]

In the 2007 cyber threat matrix developed by Spy-Ops, RBN was ranked number 4 in the development and sale of cyber attack weapons.

According to Spamhaus, RBN is “Among the world's worst spammer, child-pornography, malware, phishing and cybercrime hosting networks. Provides 'bulletproof hosting', but is probably involved in the crime too”.[10] RBN was the subject of an article[11] in the Washington Post on October 13, 2007, where Symantec and other security firms claim RBN provides hosting for many illegal activities, including identity theft and phishing. The article quotes a spokesman for Kaspersky Labs that the owners of RBN might not have directly violated the law as they primarily provide hosting services; their customers are apparently the ones violating laws.

[edit] Organization

The RBN also operates under the guise of several other different names or what even could conventionally be regarded as international business or operating divisions. These core operations apparently have no geographical base with a few showing a physical location, however again the validity of these is doubtful.[12][13]

RBN Autonomous System
  • RBNet,
  • RBNetwork,
  • RBusinessNetwork,
  • iFrame Cash,
  • SBT Telecom Network (Seychelles),
  • Aki Mon Telecom,
  • 4Stat
  • Eexhost
  • DefconHost
  • Rusouvenirs Ltd.,
  • TcS Network (Panama),
  • Nevcon Ltd. (Panama),
  • Micronnet Ltd. (St. Petersburg Russia),
  • Too coin Software (UK)
  • 76service
  • MalwareAlarm (Czech Republic)
  • InstallsCash

[edit] Political Connections

It has recently been alleged that the founder and leader of the organization, known as 'Flyman', is related to a powerful and well-connected Russian politician.[14] In light of this, it is entirely possible that recent cyber-terrorism activities, such as the denial of service attacks on Estonia in May 2007[15] and on Georgia and Azerbaijan in August 2008[16], may have been co-ordinated by or out-sourced to such an organization. Although this is currently unproven, intelligence estimates suggest this may be the case.[17]

[edit] References

[edit] External links

[edit] News

[edit] Internet comments

[edit] See also

Personal tools