• About
  • Advertise
  • Careers
  • Contact
Sunday, February 5, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Cyber Crime

8 suspects behind 3VE have also been identified.

by Cyber360 News
November 11, 2019
in Cyber Crime
0
8 suspects behind 3VE have also been identified.
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

8 suspects behind 3VE have also been identified.

Last year in August, the Federal Bureau of Investigation organized a secret meet-up between cybersecurity and digital advertising experts in its Manhattan federal building. This included Google and nearly 20 tech firms while there were nearly 30 attendees at the meeting.

The agenda of the meeting was to devise a collaborative response strategy to thwart a massive ad fraud scheme called 3VE (“Eve”) that the bureau was investigating. According to the FBI, the ad fraud scheme was threatening the global ad industry – It is noteworthy that PornHub was also hacked during 3VE scheme.

A large-scale cyber-criminal network is reportedly involved in the creation of fake ad views and clicks that are being used to defraud ad networks and marketers. The scheme has been active for the past four years and so far the cybercriminals have made millions in illegal revenue.

Apart from a coordinated mediation to capture several criminal schemes botnets, the US Department of Justice (DOJ) has also announced to file a 13-count indictment against nearly eight suspects alleged to be involved in this scheme. Three of them have been arrested already and awaiting extradition to the United States.

The suspects are identified as:

Aleksandr Zhukov (38, Russia)
Boris Timokhin (39, Russia) 
Mikhail Andreev (34, Russia and Ukraine) 
Denis Avdeev (40, Russia)
Dmitry Novikov (age unknown, Russia)
Sergey Ovsyannikov (30, Kazakhstan)
Aleksandr Isaev (31, Russia)
Yevgeniy Timchenko (30, Kazakhstan)

Google and cybersecurity firm White Ops have released a white paper [PDF] explaining the details of the 3VE scheme. Over time, according to investigators, a number of different schemes have been utilized by the operators of 3VE to generate more ad views and clicks. These include renting cybercrime botnets, hijacking IP address blocks, the creation of customized botnets hosted on different commercial data centers, using proxies for hiding original ID addresses, and developing websites to display these ads.

FBI shuts down largest-ever Ad fraud scheme '3VE'

Image credit: Google’s whitepaper

“3ve’s sheer size and complexity posed a significant risk not just to individual advertisers and publishers, but to the entire advertising ecosystem,” said Google.

According to the observations of the companies collaborating in the investigations, 3VE’s operations can be categorized into three subgroups, and the dynamics of these groups are entirely different from each other.

First Subgroup- 3VE.1

The 3ve.1 subgroup is a small component of a wide scale operation. WhiteOps dubbed it as MethBot, ESET termed it as Boaxxe, and Symantec has named it Miuref. The operations of this subgroup are powered by a network of bots, all of which are operating in various data centers located throughout the US and Europe.

The bots are basic scripts running on around 1,900 data center servers and have opened around 5,000 of counterfeit websites and web browsers that can hide the server’s IP address are also created using a fake proxy address. Fraudsters are making money by running fake ad networks that receive payments from different advertisers or ad networks for displaying ads on real websites.

FBI shuts down largest-ever Ad fraud scheme '3VE'

Image credit: Google’s whitepaper

Second Subgroup- 3VE.2

After the advertising networks blacklisted the IP addresses linked with the 3ve.1 operations, cybercriminals changed their strategy and rented “install space” that Kovter malware botnet operators were offering. 3VE operators, hence, deployed a custom bot on nearly 700,000 computers to infect them with Kovter malware.

This bot could open hidden browser windows and could load websites operated by the 3VE gang to generate revenues like before. This time, instead of having data centers hosting bots, they used malware-infected computers.

FBI shuts down largest-ever Ad fraud scheme '3VE'

Image credit: Google’s whitepaper

Third Subgroup- 3VE.3

It is simply a revamped version of 3VE.1 because it is almost identical to the first scheme with just two differences. The operators use a much smaller amount of data center bots this time and rented other data center servers to be used as proxies.

FBI shuts down largest-ever Ad fraud scheme '3VE'

Image credit: Google’s whitepaper

This time they didn’t hijack IP addresses from private networks. According to Google [PDF], this approach is although easier to detect, but 3VE operators adopted it to commit ad fraud way more efficiently.

We had to shut the operation down for good, which called for greater, more calculated measures. To that end, it was critical that we played the long game, endeavoring to have a more permanent, more powerful impact against this and future ad fraud operations, Google wrote in its whitepaper.

It is noteworthy that Trend Micro, Proofpoint, Malwarebytes, MediaMath, Amazon, CenturyLink, Adobe, F-Secure, and the National Cyber-Forensics and Training Alliance are some of the industry bigwigs participating in the investigation.

Cyber360 News

Cyber360 News

Next Post
MoviePass database exposes 161 million records

MoviePass database exposes 161 million records

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In