Difference between pages "ICANN 70" and "3ve"

From ICANNWiki
(Difference between pages)
Jump to navigation Jump to search
 
(Created page with "'''3ve''' is a ring of hackers that presented themselves as legitimate companies delivering advertisements to real human Internet users accessing real Internet webpages. This...")
 
Line 1: Line 1:
{{Event
+
'''3ve''' is a ring of hackers that presented themselves as legitimate companies delivering advertisements to real human Internet users accessing real Internet webpages. This group of [[BGP]] hijackers<ref>[https://www.cloudflare.com/en-gb/learning/security/glossary/bgp-hijacking/ BGP Hijacking, CloudFlare Glossary]</ref> faked users and webpages by programming computers they controlled to load advertisements on fabricated webpages via an automated program.  
|Logo=ICANN70 logo crop.png
 
|Start=2021/03/22
 
|End=2021/03/25
 
|City=Virtual
 
|Country/Territory=Remote
 
|Category=Community Forum
 
}}
 
'''ICANN 70''' is ICANN's Community Forum for 2021. Due to the ongoing pandemic, it is being held virtually, using the time zone of the originally planned host city, Cancun, Mexico.<ref>[https://www.icann.org/news/announcement-2021-01-14-en ICANN.org - ICANN 70 Will be a Virtual Community Forum]</ref> [https://events.icann.org/icann70/registration '''Registration is open'''] for the conference. A registered account is required to log into and view most scheduling information and supplemental materials.
 
  
==Prep Week==
+
==History==
Following in the pattern of previous fully virtual conferences, ICANN scheduled a "Prep Week" to provide information and orientation for new participants, as well as to outline and refine plenary topics.<ref name="prep">[https://70.schedule.icann.org/prep-week ICANN 70 - Prep Week] (login required)</ref> The Prep Week ran from Monday, March 8 through Thursday, March 11, 2021.<ref name="prep" />
+
===Ad Network #1===
 +
From September 2014 to December 2016, 3ve ran Ad Network #1, also known as "Methbot."<ref>[https://www.justice.gov/usao-edny/pr/two-international-cybercriminal-rings-dismantled-and-eight-defendants-indicted-causing The Datacenter-Based Scheme (Methbot), U.S. DoJ News]</ref> In this scheme, 3ve had business arrangements with advertising networks whereby it received payments in return for placing advertising placeholders (“ad tags”) on websites. 3ve rented more than 1,900 computer servers housed in commercial data centers mainly in Dallas, Texas, and Germany for loading ads on fabricated websites and spoofing over 5,000 domains. The hackers then programmed the data center servers to simulate humans browsing the internet through fake browsers, using fake mouses to move around and scroll down webpages, using video players, and appearing to be signed into [[Facebook]]. 3ve also leased over 650,000 [[IP address]]es, which were assigned the data center servers and registered as residential computers belonging to individual subscribers to various [[ISP|internet service providers]]. 3ve falsified billions of ad views and received over $7 million.
  
==Community Forum==
+
===Ad Network #2===
The Community Forum will take place over four days, using Cancun's time zone, EDT (UTC-5), for scheduling.<ref name="main">[https://70.schedule.icann.org/ ICANN 70 - Conference Schedule] (login required)</ref>
+
From December 2015 to October 2018, 3ve ran "Ad Network #2."<ref>[https://www.justice.gov/usao-edny/pr/two-international-cybercriminal-rings-dismantled-and-eight-defendants-indicted-causing The Botnet-Based Scheme (3ve.2 Template A), U.S. DoJ News]</ref> In this scheme, the hackers used a global [[Botnet Attacks|botnet(work)]] of computers infected with the [[Malware]]s known as [[Kovter]] and [[Boaxxe]]. 3ve used command-and-control servers to direct and monitor infected computers and check whether each one had been flagged by [[Cybersecurity]] companies. The hackers accessed more than 1.7 million infected computers that belonged to ordinary individuals and businesses around the world. They were able to use hidden browsers to download fabricated webpages and load ads, which ran in the computers' backgrounds. Through Ad Network #2, the hackers were able to falsify billions of ad views and receive more than $29 million.
  
===Policy Highlights===
+
===Ads.txt Development===
 +
At the end of 2016, [[IAB Tech Lab]] began developing [[Ads.txt]], which it released in late June 2017, for filtering out unauthorized sellers of a publisher’s inventory,<ref>[https://www.adexchanger.com/ad-exchange-news/domain-spoofing-gone-ads-txt-will-filter-imposter-sites/ Domain Spoofing be Gone, Ad Exchanger]</ref> as the FBI gathered evidence to build its case.<ref>[https://www.adexchanger.com/online-advertising/how-ads-txt-took-down-3ve-as-the-fbi-took-down-its-creators/ How Ads.txt Took Down 3ve, Ad Exchanger]</ref>
 +
 
 +
===U.S. Federal Indictments===
 +
On November 27, 2018, with the help of Europol, [[Interpol]], and the governments of Malaysia, Bulgaria, Estonia, Germany, the Netherlands, France, Switzerland, and the U.K., Richard P. Donoghue (United States Attorney for the Eastern District of New York), William F. Sweeney, Jr. (FBI), and James P. O’Neill (Commissioner, NYPD) announced 13 counts of indictment in a U.S. federal court in Brooklyn charging Russians [[Aleksandr Zhukov]], [[Boris Timokhin]], [[Mikhail Andreev]], [[Denis Avdeev]], [[Dmitry Novikov]], [[Sergey Ovsyannikov]], [[Aleksandr Isaev]], and Kazakhstani [[Yevgeniy Timchenko]] with widespread digital advertising fraud, wire fraud, computer intrusion, aggravated identity theft, and money laundering.<ref>[https://www.justice.gov/usao-edny/pr/two-international-cybercriminal-rings-dismantled-and-eight-defendants-indicted-causing 3ve Indictment Summary, U.S. DoJ News]</ref> Seizure warrants authorizing the FBI to take control of 31 domains and multiple international bank accounts mainly in Switzerland and search warrants authorizing the FBI to take information from 89 computer servers that were part of the infrastructure for the [[Botnet Attacks|botnets]] engaged in the criminal activity. The FBI worked with private sector partners, such as [[Google]]<ref>[https://security.googleblog.com/2018/11/industry-collaboration-leads-to.html Industry collaboration Industry collaboration leads to takedown of the “3ve” ad fraud operation, Google Security Blog]</ref> and [[WhiteOps]],<ref>[https://resources.humansecurity.com/home/the-hunt-for-3ve The hunt for 3ve, WhiteOps]</ref> to redirect traffic going to the domains by engaging in [[DNS sinkholing]].
  
 
==References==
 
==References==
{{reflist}}
 

Latest revision as of 16:27, 12 May 2021

3ve is a ring of hackers that presented themselves as legitimate companies delivering advertisements to real human Internet users accessing real Internet webpages. This group of BGP hijackers[1] faked users and webpages by programming computers they controlled to load advertisements on fabricated webpages via an automated program.

History

Ad Network #1

From September 2014 to December 2016, 3ve ran Ad Network #1, also known as "Methbot."[2] In this scheme, 3ve had business arrangements with advertising networks whereby it received payments in return for placing advertising placeholders (“ad tags”) on websites. 3ve rented more than 1,900 computer servers housed in commercial data centers mainly in Dallas, Texas, and Germany for loading ads on fabricated websites and spoofing over 5,000 domains. The hackers then programmed the data center servers to simulate humans browsing the internet through fake browsers, using fake mouses to move around and scroll down webpages, using video players, and appearing to be signed into Facebook. 3ve also leased over 650,000 IP addresses, which were assigned the data center servers and registered as residential computers belonging to individual subscribers to various internet service providers. 3ve falsified billions of ad views and received over $7 million.

Ad Network #2

From December 2015 to October 2018, 3ve ran "Ad Network #2."[3] In this scheme, the hackers used a global botnet(work) of computers infected with the Malwares known as Kovter and Boaxxe. 3ve used command-and-control servers to direct and monitor infected computers and check whether each one had been flagged by Cybersecurity companies. The hackers accessed more than 1.7 million infected computers that belonged to ordinary individuals and businesses around the world. They were able to use hidden browsers to download fabricated webpages and load ads, which ran in the computers' backgrounds. Through Ad Network #2, the hackers were able to falsify billions of ad views and receive more than $29 million.

Ads.txt Development

At the end of 2016, IAB Tech Lab began developing Ads.txt, which it released in late June 2017, for filtering out unauthorized sellers of a publisher’s inventory,[4] as the FBI gathered evidence to build its case.[5]

U.S. Federal Indictments

On November 27, 2018, with the help of Europol, Interpol, and the governments of Malaysia, Bulgaria, Estonia, Germany, the Netherlands, France, Switzerland, and the U.K., Richard P. Donoghue (United States Attorney for the Eastern District of New York), William F. Sweeney, Jr. (FBI), and James P. O’Neill (Commissioner, NYPD) announced 13 counts of indictment in a U.S. federal court in Brooklyn charging Russians Aleksandr Zhukov, Boris Timokhin, Mikhail Andreev, Denis Avdeev, Dmitry Novikov, Sergey Ovsyannikov, Aleksandr Isaev, and Kazakhstani Yevgeniy Timchenko with widespread digital advertising fraud, wire fraud, computer intrusion, aggravated identity theft, and money laundering.[6] Seizure warrants authorizing the FBI to take control of 31 domains and multiple international bank accounts mainly in Switzerland and search warrants authorizing the FBI to take information from 89 computer servers that were part of the infrastructure for the botnets engaged in the criminal activity. The FBI worked with private sector partners, such as Google[7] and WhiteOps,[8] to redirect traffic going to the domains by engaging in DNS sinkholing.

References