This article may be in need of reorganization to comply with Wikipedia's layout guidelines. (January 2017) |
Operation Tovar | |
---|---|
Operation Name | Operation Tovar |
Roster | |
Executed by | U.S. Department of Justice, U.S. Federal Bureau of Investigation, U.K. National Crime Agency |
Countries Participated | United States, United Kingdom, South African Police Service, Australia, Netherlands, Germany, Luxembourg, Ukraine, Canada, New Zealand, Japan, Italy, and France |
# of Countries Participated | 13 |
Mission | |
Target | Gameover ZeuS botnet |
Method | undisclosed |
Timeline | |
Date begin | Before June 2014 |
Results | |
Arrests | 2+ |
Accounting |
Operation Tovar was an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which was believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware.[1]
In early June 2014, the U.S. Department of Justice announced that Operation Tovar had temporarily succeeded in cutting communication between Gameover ZeuS and its command-and-control servers.[1][2][3]
The criminals attempted to send a copy of their database to a safe location, but it was intercepted by agencies already in control of part of the network.
krebs2014
was invoked but never defined (see the help page).