Google Disrupts Russian Botnet – 1 Million Windows Machines Infected

Google Sues Operators of Extensive Glupteba Botnet
Google has initiated legal action against two Russian citizens alleged to be the masterminds behind a large-scale botnet operation. This network has compromised over 1 million Windows computers globally without detection.
Details of the Lawsuit
The lawsuit, filed in the U.S. District Court for the Southern District of New York, identifies Dmitry Starovikov and Alexander Filippov as the primary operators of the Glupteba botnet. Google alleges they utilized Gmail and Google Workspace accounts to facilitate the operation of this criminal venture.
The tech company asserts that the defendants deployed the botnet – characterized as a “modern, borderless technological embodiment of organized crime” – for illegal activities. These include the theft and misuse of login credentials and account information belonging to Google users.
Google is seeking financial damages and a permanent ban on Starovikov and Filippov’s access to all Google services.
How the Glupteba Botnet Functions
Google has been monitoring the Glupteba botnet since 2020. Currently, it has infected roughly 1 million Windows machines worldwide, with the number of compromised devices increasing by thousands daily.
Infection typically occurs when users are deceived into downloading malicious software from third-party “free download” websites. Once a device is compromised, the botnet steals user credentials and data.
Furthermore, infected machines are secretly used to mine cryptocurrencies and establish proxies. These proxies redirect internet traffic through compromised devices and routers.
“The collective power of the Glupteba botnet presents a significant threat, potentially enabling large-scale ransomware attacks or distributed denial-of-service attacks,” Google stated in its complaint.
Unique Technical Aspects
The Glupteba botnet distinguishes itself from traditional botnets through its advanced technical design. It leverages blockchain technology to enhance its resilience against disruption, as detailed in Google’s complaint.
Disruption Efforts and Ongoing Concerns
Google’s Threat Analysis Group (TAG) has collaborated with internet hosting providers to dismantle key command and control (C2) infrastructure associated with the botnet. TAG has observed the botnet targeting victims in the U.S., India, Brazil, Vietnam, and Southeast Asia.
While the operators have temporarily lost control, Google cautions that the botnet could resurface due to its reliance on blockchain technology as a recovery mechanism.
“Unlike conventional botnets, Glupteba doesn’t depend on fixed web domains for survival,” Google explained. “When its C2 server is disrupted, the malware automatically searches the public Bitcoin blockchain for transactions linked to specific Bitcoin addresses controlled by the Glupteba Enterprise.”
“Complete eradication of the Glupteba botnet necessitates neutralizing its blockchain-based infrastructure.”
Broader Context
This action represents Google’s first legal challenge against a botnet operation. It follows closely after Microsoft’s announcement of seizing control of malicious websites utilized by Chinese hackers to target governments and human rights organizations across the U.S. and 28 other nations.
- Botnet: A network of computers infected with malware and controlled remotely.
- Ransomware: A type of malware that encrypts a victim’s files and demands a ransom for their decryption.
- Blockchain Technology: A decentralized, immutable ledger used to record transactions.
Related Posts

NHS England Data Breach Confirmed by Tech Provider

Cisco Zero-Day Exploit: Chinese Hackers Targeting Customers

Pornhub Hacked: User Data Extorted by Hacking Group

Google and Apple Release Emergency Security Updates

700credit Data Breach: 5.6 Million Affected
