WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Google Disrupts Large Botnet, Files Lawsuit against Russian Threat Actors
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Google Disrupts Large Botnet, Files Lawsuit against Russian Threat Actors

Author: Alec Davison

Created: Thursday, December 9, 2021 - 18:23

Categories: Cybersecurity

On Tuesday, Google took significant steps to disrupt and degrade the Glupteba botnet, which now controls over 1 million Windows PCs worldwide. Glupteba is a blockchain-enabled modular malware that has targeted Windows devices globally since at least 2011. Threat actors can then use the infected devices for malign purposes, such as stealing credentials or personally identifiable information. Glupteba is typically distributed onto a victim’s device through pay-per-install (PPI) networks and traffic acquired from traffic distribution systems (TDS) disguised as “free, downloadable software, videos, or movies.” Devices infected by Glupteba can then be used to mine for cryptocurrency, steal user credentials and cookies, and install proxies on Windows systems and internet of things (IoT) devices.

Google took over Glupteba’s command and control (C2) infrastructure to degrade the malware’s ability to operate. The company also filed for a temporary restraining order and filed a lawsuit against 17 defendants, two of them Russian, who are accused of being the criminals behind Glupteba. If the legal action is successful, Google hopes it could create real legal liability for the threat actors. Ultimately, Google’s actions are geared toward making the internet safter for all users. Read more at BleepingComputer.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar