A Clearwater, Fla.-based antispyware vendor says it has stumbled upon what could be a massive identity theft ring that uses spyware-infected machines to collect personal data. The company says it has contacted the FBI and Secret Service and that both have begun investigations.
Sunbelt Software CEO Alex Eckelberry said on the firm's activity blog that keylogging software is being used to collect user IDs, passwords, bank account balances and other personal information. The information is being dumped on a server located somewhere in the United States.
"Here is a quick idea of what happened: Patrick Jordan, our most senior CoolWebSearch (CWS) expert, was doing
He said the scale of the operation is "unimaginable" with thousands of machines pinging back daily. He said there's a keylogger file on the server "that grows and grows, and then is zipped off and then the cycle continues again." He added, "While thousands of machines are pinging back, the amount that [is] being logged into the keylogger file is less than that, but still significant. The server is in the U.S. but the domain is registered to an offshore entity. The types of data in this file are pretty sickening to watch. You have IM chat sessions, search terms, Social Security numbers, credit cards, logins and passwords, etc."
Eric Sites, Sunbelt's VP of research and development, said he couldn't offer more detail on how the server was found or where it's located because doing so might compromise the investigation. But he said the FBI and Secret Service are reviewing Sunbelt's findings. At the time of writing, the FBI had not returned a phone call seeking confirmation of the investigation.
Sites said the ID theft effort involves the use of Trojan horse programs as well as keyloggers. Both are considered to be among the most insidious forms of spyware. He added that the hacker involved is going back to the server every couple days to download information stored there by thousands of zombie machines.
He added that different variants of the Trojan have been found. "This Trojan is totally geared for ID theft," Sites said. He wouldn't name the specific Trojan, saying, "We don't want to tip anyone off."
Information found on the server includes the $380,000 bank account balance of an African company and the $11,500 bank account balance of a California business. "We've called companies like this and told them of the compromise," Sites said.