May 19, 2014, 12:00 PM — Law enforcement agencies from 16 countries on three continents last week arrested 97 people after executing raids targeting those suspected of creating, buying and using a notorious Trojan program called BlackShades.
Over two days, police carried out 359 house searches and seized over 1,100 computers, laptops, mobile telephones, routers, external hard drives and USB memory sticks, Eurojust said Monday on its website. The Dutch Public Prosecution Service said that the global operation was coordinated from Eurojust in The Hague.
Rumors about the police searches related to BlackShades have appeared on underground forums since early this month and intensified last week, according to Rickey Gevers, a cybercrimine investigator who has been tracking the reports.
The operation saw the participation of law enforcement agencies from the Netherlands, Belgium, France, Germany, the U.K., Finland, Denmark, Austria, Estonia, the U.S., Canada, Chile, Switzerland, Croatia, Moldova and Italy, the Dutch prosecutors said.
BlackShades is a remote access tool, or RAT, and although its creators tried to publicly market it as a program for legitimate computer monitoring, it was also sold to many hackers and cybercriminals.
Once installed on a computer, BlackShades allows the operator to perform a wide range of privacy-invading and potentially malicious actions, including viewing the computer screen; uploading, downloading and executing files; recording keystrokes; encrypting files; and controlling the webcam. All infected computers can be managed from a remote administration interface, similar to a botnet.
In a criminal case opened in Rotterdam, a 19-year-old man is suspected of using BlackShades to gain access to over 2,000 webcams and take pictures of female users, the Dutch prosecutors said.
Researchers from Symantec reported in November that BlackShades was still being sold and widely used in cybercriminal activities despite the program's source code being leaked in 2010 and one of the project's key players being arrested by the FBI in 2012.
The new law enforcement operation seems to be partially based on information obtained by the FBI from one of the malware's co-creators.