Police investigating botnet attacks on UK government
Security vendor Finjan says that a huge Ukrainian botnet has affected corporate and government computers in the UK.

The Metropolitan Police is investigating claims that a botnet made up of two million infected computers has hit UK computers, including ones found in corporate and government departments.
The Police Central e-crime Unit is on the case and the investigation was ongoing, the Met has confirmed.
The botnet is said to have compromised 77 government-owned domains from the UK, US and other countries.
Finjan's Malicious Code Research Centre (MCRC) discovered the network in investigations of command and control servers operated by cyber criminals.
Finjan said that the cyber crime server has been in use since this February, and was hosted in the Ukraine.
The malware on the computers allows cybercriminals to execute commands on end user computers.
In addition to contacting the police, Finjan said it had contacted the affected government agencies.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The Cabinet Office, which plays a role in guiding and setting standards for the use of IT in government, had not responded to our request for comment at time of publication.
However, in a statement to the BBC, a spokesman said it would not comment on specific attacks and that it was not government policy to confirm if an individual organisation had been subject to one.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott Published
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly Published
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly Published
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones Published
-
UK police fails ethical tests with "unlawful" facial recognition deployments
News A University of Cambridge team audited UK police use of the tech and found frequent ethical and legal shortcomings
By Rory Bathgate Published
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić Published
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones Published
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones Published