7 Search Warrant Application and Affidavit 0
7 Search Warrant Application and Affidavit 0
District of Alaska
The basis for the search under Fed. R. Crim. P. 41 (c) is (check one or more) :
0 property designed for use, intended for use, or used in committing a crime;
App1zca11t ·s signature
City and state: Anchorage, Alaska Hon . Deborah M. Smith , United States Magistr;ite Judge
Printed name ond titie
•I,,,
IN THE UNITED STATES DISTRICT COURT
IN RE APPLICATION FOR A
WARRANTUNDERRULE41OFTHE
FEDERAL RULES OF CRIMINAL
Case No. 3:17-mj-00135-DMS
PROCEDURE TO DISRUPT THE
KELIHOS BOTNET
AFFIDAVIT IN SUPPORT OF AN
APPLICATION UNDER RULE 41 FOR A SEARCH
WARRANT
I, Elliott Peterson, being first duly sworn, hereby depose and state as
follows:
Cyber Squad. I have investigated cyber and computer intrusion matters for over
five years and I specialize in the investigation of complex botnets, including Peer to
Peer botnets, as well as botnets facilitating account takeover fraud and distributed
the Kelihos botnet currently under the control of Peter Yuryevich LEVASHOV, a
and/or IP filter lists, further described in Attachment B, to the TARGET APR _ 5 2017
Attachment A. This operation will also obtain the Internet Protocol addresses and
associated routing information of those infected computers, and those addresses are
evidence of crimes committed by LEVASHOV. A PRTT order has been requested for
information. This operation will not capture content from the TARGET
COMPUTERS or modify them in any other capacity except limiting the TARGET
achieved through the distribution of peer lists and job messages, described below.
your affiant, other special agents and officers of the Federal Bureau of Investigation
(FBI), third-party witness interviews, and/or from other law enforcement officers
who conducted additional investigation into the subject matter of this criminal
TECHNICAL DEFINITIONS
2 APR - 5 2017
d. "Peer to peer" refers to a means of networking computers such that
they communicate directly with each other, rather than through a
centralized management point.
PROBABLE CAUSE
collectively receive and obey commands from a common command and control
"Kelihos."
principal functions are to (1) distribute high volumes of spam email to further
criminal schemes; (2) install malicious payloads, such as ransomware; and (3)
harvest user credentials from infected computers. Each of these schemes are
a.k.a. "Petr LEVASHOV," "Peter Severa," "Petr Severa," and "Sergey Astakhov." I
-··---
---
11111
II
-·-·- -
------,
3 : 17-mj-00135-DMS
APR - 5 2017
3
----
----- .. - --
__..______•__ _•
...-
... .
_.._
--
-· ·-·
• 1 I have
also determined that the botnet is used for the financial benefit of LEVASHOV and
other cybercriminals.
paragraphs.
1 I am also aware that an indictment was filed in 2007 in the Eastern District of
Michigan for conspiracy to commit electronic mail fraud, mail fraud, and wire fraud in
violation of 18 U.S.C. §§ 371, 1037(a)(2)-(a)(3), 1037(b)(2)(C), 1341, and 1343 and several
substantive counts of violating 18 U.S.C. §§ 1037(a)(2), 1037(b)(2)(C), and Section 2. That
indictment remains pending. I am also aware that a criminal complaint filed in the U.S.
District Court for the District of Columbia, which in 2009 charged LEVASHOV in his true
name with two substantive counts of violating 18 U.S.C. §§ 1030(a)(5)(A)(i), 1030(a)(5)(B)(i),
1030(a)(5)(A)(i) and 1030(a)(5)(B)(V), as well as one count of conspiracy to commit these
offenses in violation of 18 U.S.C. § 371. These charges resulted from LEVASHOV's
operating the Storm Botnet from January 2007 until September 22, 2008. That botnet, like
that which is the subj ect of this prosecution, sent spam to facilitate pump and dump
schemes and the purchase of grey market pharmaceuticals. Because the government was
unable to apprehend and detain LEVASHOV, it dismissed the complaint in 2014. ~
3: 17-mj-00135-DMS
APR - 5 2017
4
computers infected with Kelihos at any one time can vary. At times, over 100,000
the number sits between 25,000 and 100,000, approximately 5-10% of which are
computers located in the United States. Based on my review of computers which are
infected with the Kelihos malware and conversations with other FBI agents and
computer security researchers who have investigated the code used to create the
Kelihos botnet, I know that it can be difficult for computer users to detect Kelihos
actions by the victim to remove it. For example, the first time that Kelihos runs, it
the victim. Based on my investigation and the investigation of others, I have found
Washington, Central District of California and the Southern District of New York.
Instead of utilizing a traditional Command and Control (C2) server to control all of
the bots, control is distributed across the entire infection base. The P2P design
prevents law enforcement from merely taking over the C2 server and gaining
11. Kelihos infects computers and divides them into two groups: "router
nodes" and "worker nodes." Router nodes are so named based upon their ability to
peers. Router nodes are Kelihos infections that have publicly accessible IP
12. In contrast, worker nodes comprise 90% of the Kelihos botnet, and
addresses, a s they are separated from the Internet by one or more networking
devices. For example, in many U .S. households, a Wi-Fi router is connected directly
to a cable or DSL modem. This Wi-Fi router would then be assigned the
household's public IP address. Each device then connected to the Wi-Fi router
would be assigned a private IP address. Worker nodes are harder to maintain for
the botnet operator, as they are not directly accessible like a router node with a
addresses, Kelihos commands its worker nodes to check in regularly with the router
nodes. That "check in" takes the form of exchanging peer lists and job messages.
Peer lists maintain the IP addresses of other Kelihos infections, that is, an infected
computer's peers . This information informs each peer who else it can communicate
with. Then, when a set amount of time has passed, the worker node will contact
3:17-mj-00135-DMS ~
6 APR - 5 201 7
another router node to exchange data, including each other's peer lists. In response,
the worker node then compares its own peer list with the received peer list, and
updates its own peer list with new IP addresses until it reaches a maximum
number of 3,000.
14. Based upon my training and experience, I know that spam email
Spam emails directing the recipients to participate in all of these schemes have
Based upon my training and experience, I know that many of these branded
pharmaceuticals are offered at or below market rates, indicating that they are likely
counterfeit.
messages, the recipient is led to believe that a specific stock will soon trade at a
much higher value. For example, one email I reviewed stated that it was a ~
3:17-rnj-00135-DMS
APR - 5 2017
7
"Advanced Trading Alert Notice," with a "hot pick that will gain 100%... " The email
receive 100% profit." . Another email stated "Don't you crave to purchase a deal at
$0.07 and cash at $.21?! 200% gains simple. Get the stock: [... ]. See,[. ..] current
ask is 0.21, it's 200% than the todays bid. On Monday they will announce big news
and it sure spike to .21. Start buying [... ] quick." Because these emails target
stocks which generally experience very low trade volume, they are vulnerable to
recruitment scams commonly called "work from home." In these messages, the
unwitting recipient is directed to an email address or website from which they can
have previously investigated these types of schemes and know them to principally
individuals are instructed to receive and transfer funds in short time periods, often
1-3 days . The incoming funds are usually proceeds of other criminal schemes which
are then laundered through the unwitting recipient's bank account. Due to the
short time period from which money is received and then resent, the victim often is
left responsible for the full amount laundered through their accounts after the
financial institution detects the fraud and ceases further payment. These email
schemes are also evidence of larger wire fraud schemes, as they make fraudulent
3: 17-mj-00135-DMS
APR - 5 2017
8
spam in at least two distinct ways. FBI personnel have observed Kelihos distribute
spam from infected computers directly. Kelihos can command infected computers to
addresses passed to the computer from the botnet. In these cases, Kelihos uses
email addressf)S and randomly generated first and last name combinations not
obviously associated with the true account from which the spam was sent. Known
as "spoofing," the result is that the spam will be made to appear to come from
editing the header information. The spoofing makes the spam much more difficult
to detect and block, while also concealing the true origins of the email messages.
Kelihos can also send spam directly from mail servers, such as those owned by
Earthlink or 1&1 Mail & Media, by gaining unauthorized access to them through
the use of authentic email addresses and passwords harvested by Kelihos. In those
instances, the spam is, in essence, sent from the victim's email address through the
19. In addition to sending spam emails with URL hyperlinks that cause
the downloading of malware, the Kelihos botnet can also command infected
victims to download and execute malware, Kelihos can retain near total contr~
3:17-mj-00135-DMS
APR - 5 2017
9
the victim's computer system by infecting them with payloads that can include
(malware that encrypts the contents of a computer and then seeks a ransom
computers within his botnet. This allows LEVASHOV to monetize his botnet
Kelihos malware also harvests user credentials from victim computers through a
computers for files known to contain usernames and passwords, including files
associated with Internet browsers Chrome, Firefox, and Internet Explorer. Any
email addresses and passwords located in these searches are harvested by Kelihos
the victim computer's network card. Usernames and passwords found within this
22. Many techniques were utilized to analyze and study the Kelihos
m alware. One of the first steps was to gather appropriate samples of the malware.
One feature of the Kelihos botnet circa 2015 is that the Kelihos malware could be
downloaded directly from backend servers . A specific type ofbackend servers were
the naming convention relates to the role these servers play as redundant
mechanisms of command and control. When a computer infected with Kelihos can
out to domains (websites) that are hardcoded into its configuration. These domains,
the "Golden Parachutes," provide a peer list to the infected computer so that it can
r egain communication with other infected peers. For the purposes of this affidavit,
there are at least three such domains presently relevant to the functioning of the
providing peer lists, research has shown that these Golden Parachute Domains
At any given time there appears to be ten to twenty separate Kelihos "affiliates."
These affiliates are paid by LEVASHOV to infect computers with his Kelihos
2
While the actual web addresses do not include"(.)," I h ave added them here to
avoid accidental hyper linking to these sites.
3: l 7-mj-00135-DMS
APR - 5 201 7
11
malware. The affiliates are paid according to the number of victims they infect and
where those victims are located. I am aware of the affiliate model, because I
listed instructions for affiliates, as well as the payment rate per 1000 infections. .
many botnet families, prioritizes the infection of U .S. victims. This can be seen in
the higher rates paid for U .S. victims. Based on my training and experience, I
believe U .S . infections are prized by LEVASHOV because many of his schemes are
affiliate IDs because the Smoney website maintained a full listing of active
affiliates. For example, one such affiliate was boxi002 . By issuing a query for
the Kelihos malware. This analysis was based upon comparing characteristics of
case, the downloaded boxi002.exe file interacted with the Windows Registry in a
m anner identical to Kelihos . That is, key r egistry values were modified so thA
3: 17-rnj-00135-DMS
APR - 5 2017
12
executable would be loaded each time the system started up. This occurs without
ensure that Kelihos remains on the victim's computer despite any overt actions by
26. My conclusions were similar to those of agents with the FBI's New
Haven, Connecticut Field Office who have also examined the Kelihos malware. The
New Haven Field Office conducted additional testing and activated a sample of the
Kelihos malware and observed the infected computer attempting to send high
volumes of spam emails. Many of those emails supported a "pump and dump"
furtherance of the Kelihos scheme. In doing so, I observed commands issued from
suggested to the recipients that the stock would significantly increase in value, in
searches specific locations on computers for files known to contain usernames and
passwords, including locations which store such data for several common internet
browsers, including Chrome, Firefox and Internet Explorer. New Haven Division
3:17-mj-00135-DMS
13
FBI computer. Shortly after Kelihos was installed, this username and password
was observed within Kelihos's process memory, indicating that it had been
29. Kelihos also searches for usernames and passwords for Windows
programs that use File Transfer Protocol ("FTP"). As its name suggests, FTP is a
standard network protocol used for the transfer of computer files between
server in another location using FTP functionality. New Haven Division stored a
FTP username and password combination on an infected FBI computer, and the
30. Finally, the New Haven Division observed that Kelihos installed on an
FBI computer a software program called WinPCAP, which is able to intercept and
More specifically, Kelihos used this WinPCAP functionality to search for email
servers associated with the Kelihos botnet. Both were located outside the United
3:17-mj-00135-DMS
~
APR - 5 2017
14
States. In cooperation with international law enforcement partners, I received real
time data from those servers which revealed multiple associations between the
proxy, meaning that some portion of his Internet activities are directed through the
panels, or websites, that provide status updates on the Kelihos botnet. Panels such
33. In this case, the Kelihos panel is constructed as a website and includes
information such as the status of its servers and the status of the Golden Parachute
specifically referenced, with color codes used to indicate their readiness status.
Another portion of the webpage shows various backend servers, the spam messages
they are being used to distribute, and data such as the speed at which the messages
are being distributed. For example, as shown below, the email "lists" being utilized
3:l 7-mj-00135-DMS
15
34. Other portions of the Kelihos panel include antivirus and blacklisting
reports. This indicates that the operator actively monitor whether or not their
This is important for the operator, as blacklisting could reduce the reliability of
their botnet. For example, the panel indicated that both of the servers referenced
spam email messages distributed by Kelihos. Subject lines of emails that appear to
have been sent to email accounts (including many hosted by Alaskan ISP General
Communication, Inc (GCI.net)) include, "Very good way to reveal your intimate life,"
"No amorous failure risk," "Attack your woman harder," and "Are you ready to
please your female partner tonight?" These emails contained links to websites that
3:17-mj-00135-DMS
16
36. Also appearing to have been sent to GCI.net email accounts were
emails with the subject lines, "This Company looks ready for a major run this
week! ", "Big Gainers Since My Alert!", "It is about to wake up and ROAR!" and "Its
trading levels could change in no time (MUST READ)." The content of all of these
emails were similar as they are intended to persuade the recipient to purchase a
specific U.S. listed stock. For example, one email's content listed:
- - -
This Stock is our New WILD Sub-Penny Pick! Get Ready for Multi-Bagger
Gains!
Top 10 Reasons Why We Love This Pick!
Company Name: KCl
Traded as: KCl
Long Term Target: $1.70
Trade Date: February, 29th
Closed at: 0.30
37. These spam emails facilitate "pump and dump" stock schemes, as
previously described in this affidavit. I have examined historical prices for several
stocks for which Kelihos has conducted spam email campaigns and noted that such
from 30 to 80 percent.
that this server was utilized thousands of times to log into the mail.ru website tied
indicates that the user of the Kelihos server was also utilizing the email
with Pete LEVASHOV, a websmith and programmer located in Russia, with a date
3: l 7-mj-00135-DMS
17 APR - 5 2017
of birth of 8/13/1980. The website 3038.org appears to be the website for a high
information indicates that this account was registered with Apple using the IP
address 83.243.67.25. Moreover, Apple's records list the Apple Digital Signaling
40. 83.243 .67 .25 is the same IP address utilized to register the Google
access these accounts, including 91.122 .62 .16. Additionally, access logs from Apple
and Google indicate that these accounts share temporal overlap with IP addresses
as well, meaning that the same IP addresses are utilized during similar time
particularly during the same time period, suggest that the same individual is
41. The IP address 91.122 .62.16 was also used by LEVASHOV to negotiate
the purchase of a digital certificate from the company GeoTrust. An email was sent
3:17-mj-00135-DMS
~?R _ r, 2G\7
18
subsequently attained by agents within FBI's New Haven Division, and indicate
order for the certificates utilizing the IP address 91.122.62.16. Moreover, the
certificate order was then completed, minutes later, utilizing the IP address
log into the aforementioned [email protected] email account. This evidence of other
both the Kelihos server and Google and Apple accounts which point to him.
records for an account in the name Petr LEVASHOV, registered with email address
[email protected]. This account also displayed the same pattern of temporal overlap
within the IP access logs, when compared to the previously mentioned Apple and
Google accounts. Again, this indicates the account is likely used by LEVASHOV.
85 .17.31.90. This IP address also appears within LEVASHOV's Apple DSID iCloud
account 1972828024, and the Google account [email protected]. Google records from
2016 indicate that [email protected] had been accessed by only two other IPs, one of
.M
44 . The server corresponding to IP address 94.242 .250.88 also contained
many references to LEVASHOV. For example, an email sent on February 26, 2016
3: 17-mj-00135-DMS
19
APR - 5 2017
from [email protected] to [email protected] with the subject line, ''Your
status update on an iOS application. There are many such emails sent from this
about June 4, 2013 , the following search terms, "kelihos" and "kelihos.f' were
provided by Google showed that the cellphone number associated to this Google
records. Based upon my training and experience I know that it is common for
criminal techniques and offer products and services for sale. The use of nicknames
allows them to protect their true identity, while still allowing for the benefits of
name and product recognition. While there are a large number of Internet forums
devoted to the exchange of criminal services and techniques, many criminals will
use the same nickname on different forums. This is likely due to perceptions of
email, jabber, or ICQ handle. Jabber and ICQ are "chat" applications. These
3:17-mj-00135-DMS
20 APR - 5 2017
marketplaces in which products and services are sold. LEVASHOV utilized
multiple nicknames, but the most common was "Severa" or "Peter Severa."
"Severa," I have noted that in the majority, the ICQ number 104967 has been
utilized since at least 2010. ICQ is a popular Internet instant message service in
which users are identified by unique numerical values, known as ICQ numbers.
~
Based upon my training and experience, I know that online monikers,~such~as ICQ -
conclude that the combination of an identical ICQ number and nickname are
48. Severa has used this ICQ number to advertise his botnets. For
instance, in May 2015 , the FBI received the following information pertaining to a
vendor on the Russian criminal site Korovka.cc. The vendor was advertising
"webmailer email spam" capability and the information he provided read as follows :
Username: "Severa"
Registration: 12/2/2011
Jabber contact: [email protected]
ICQ: 104967
Service: Email spam
Details: The service was offered since 1999 and delivered
spam to a recipients inbox. Every spam launched used several
thousand clean IP addresses and accounts. Unique algorithms
and technologies were constantly improved. Seller has US and
Europe email databases for spam, and fresh databases received
daily. Prices per million spam delivered were $200 USD legal
advertisement, adult, mortgage, leads, pills, replies, etc... $300
USD job spam (drops, mules, employment), and $500 USD
scam/phishing attacks.
3:17-mj-00135-DMS
APR - 5 2017
21
that of his competition and would be less likely to be detected ("clean IP addresses
and accounts" and "unique algorithms") and that he had been doing this for a long
type of instant messaging service widely utilized on the internet. Because XMPP
servers can be individually hosted and managed, rather than hosted and managed
51. Similarly, on or about January 14, 2017, Severa posted the following
Hello.
3
The advertisement, which was written in Russian, was later translated into English
by a FBI linguist. The references in the advertisement to "[PH]" are those of the linguist and
reflect that a word has been translated phonetically. ~
3: 17-rnj-00135-DMS
APR - 5 2017
22
Every spamming is being automatically monitored for quality, with
regular automatic spamming and running test messages.
Petr Severa
more spam deliveries. Upon an initial inquiry looking for the "services of Peter
responded on March 21, 2017: "Hi, I am Peter Severa. I were away. what do you
3:17-mj-00135-DMS
APR - 5 2017
23
53. In subsequent exchanges between Severa and the individual on March
20 , 2017 , Severa stated that he accepts bitcoins. "Job offers"-which I know based
"300 usd per 1 million emails, 450 per 2 mil[lion] ." However, Severa also indicated
price differentials for different kinds of spam deliveries: "phishing, scam etc 500 usd
per 1 mil . . . 750 per 2." Severa also confirmed that the individual could purchase
spam to be sent only to a specific country (including the United States). Severa
stated: "i need just payment and letter to start," and instructed that, "[A]fter
to sendspace.com's website, "Sendspace is the best way to send large files, too big
for email attachments, to friends, family and businesses, anywhere in the world."
54. On or about March 21, 2017, the individual paid Severa in bitcoin to
purchase a spam campaign to be directed at the United States. The spam email
submitted to Severa included a link to a website advertising "work from home" job
opportunities. Severa responded that the "Mailing takes 3-4 hours, but response can
come during 2-4 days , people don't r ead emails instantly." He again reiterated that
4
A "mule" or "money mule" is an individual who is used to transport or launder stolen
money in furtherance of criminal activity and its related organizations. These individuals
can be either wittingly or unwittingly participating in the fra ud.
3: l 7-mj-00135-DMS
APR - 5 2017
24
55. The individual then asked Severa, "I had client recontact me about
ransomware. you can do?" Within approximately twenty minutes, Severa responded
via chat:
you need fresh _text which never s_ent before, _and yo_l!_should _
randomize it by synonyms, by my template. You can use synonym.com
service to find variants. You can do html message, but images only by
links, not attachments.
Template:
{Spam IBlackmailing IPhishing Mailing} is {good Ivery good Ithe
best}! Always {send I use Iorder Iask for}{it Ithis}{. I! I!!!}
Severa and this individual, I believe that Severa's reference to "mailings for
3:l 7-mj-00135-DMS
25 APR - 5 2017
SEVERA: it's PD
pump and dump
i have 25 mil traders list
my price usually is 5% of trade
with 5-l0k deposit
Individual: fair
its users to store funds in different "purses," where each purse can be maintained as
the use of IP address 91.122.62 .16, the same IP utilized to access LEVASHOV's
iCloud account in his real name. This same IP address was also found to have
3: l 7-mj-00135-DMS
26 APR - 5 2017
accessed a WebMoney identifier (i.e. account) ending in 4986. Of note, registered
under this account is the WebMoney purse ending in 1018, which is the purse
supplied by LEVASHOV, under his Severa alias, when requesting payment for his
11 hours prior to when the WebMoney account was accessed from that same IP
address. In the second instance, the same IP address accessed the WebMoney
account between May 17 and 18, 2016, and I observed one iTunes update a little
over an hour prior to that period and another update approximately 14 hours after
that access period ended. Based on my training and experience, the overlapping use
used WebMoney account by the alias Peter Severa indicates that Peter Severa is
LEVASHOV.
JURISDICTION
60. This Court has jurisdiction to issue the requested warrant under Rule
41(b)(6)(B) because the above facts establish there is probable cause to believe that
the items to be searched are protected computers that have been damaged without
authorization and are located in five or more judicial districts and that there is
probable cause to believe that activities related to the crime being investigated
3:17-mj-00135-DMS
APR - 5 2017
27
occurred within this judicial district. 5
Peer botnet, infected computers exchange data on other known Kelihos infections.
62. Examination of peer lists exchanged between peers in the botnet has
revealed IP addresses that geolocate to- Alaska, Co-nnecticut,-the Weste-r n District of
Washington, Central District of California and the Southern District of New York,
and numerous other judicial districts. Geolocation is a term that denotes the
addresses assigned to an ISP based in Alaska likely belong to subscribers also based
in Alaska. After identifying one such victim located in Alaska, in April 2016, I
found that her computer's configuration settings had been changed, and that an
executable file was set to open any time her computer started up. Examination of
63. The presence of Kelihos exposed this victim to significant potential for
other malicious payloads such as ransomware. Moreover, the victim's computer was
5
Fed. R. Crim. P. 41 was amended on December 1, 2016. Rule 41(b)(6)(B) is a new
venue provision which went into effect on that date.
3:l 7-mj-00135-DMS
APR - 5 2017
28
also subject to be used for the distribution of high volumes of spam to others
send spam emails to victims worldwide, my investigation revealed that these emails
of malicious spam. I have studied a list of email addresses used by the Kelihos
100 email addresses whose domains include kl2 .ak.us , meaning that these
addresses are utilized by employees of school districts within Alaska. The same list
has nearly 5,000 entries of emails utilizing the GCI.net domain. This domain,
Internet service providers within Alaska. I have also examined a March 28, 2017
Kelihos job message that directed the distribution of a spam message to 10,000
email accounts, three of which utilized email addresses with the domain
the city of Juneau. The subject line of the spam email was, "Do you want to impress
your female partner tonight?" and the email included a link to a website which
purported to be the "Canadian Health and Care Mall." The website offered for sale
Cialis, pain relief medications such as Celebrex and Toradol, antibiotics such as
3:l 7-mj-00135-DMS
APR - 5 20 17
29
The website itself contained fraudulent endorsements from the Federal Drug
65. To effectively combat the P2P structure of the Kelihos botnet, the FBI
with assistance of private partners will participate in the exchange of peer lists and
job messages with other infected computers. 6 The FBI's communications, however,
will not contain any co~~a~d~, no; will th-ey contain IP aclciresses of any of the
infected computers. Instead, the FBI replies will contain the IP and routing
information for the FBI's 11 sinkhole 11 server. As this new routing information
permeates the botnet, the Kelihos infected computers will cease any current
malicious activity and learn to only communicate with the sinkhole. The effect of
these actions will be to free individual infections from exchanging information with
the Kelihos botnet and with LEVASHOV. This will stop Kelihos's most immediate
harm, the harvesting of personal data and credentials, and the transmittal of that
messages is a list, known as the IP filter list. This list functions as a type of
blacklist, preventing communication with those IPs contained within the filter list.
If necessary, the FBI also seeks authorization to send a filter list to TARGET
6
The law is unsettled as to whether the operation authorized by the proposed
warrant constitutes a search or seizure. However, in an abundance of caution, the United
States is seeking a warrant.
3:17-mj-00135 -DMS
APR - 5 2017
30
with router nodes.
66. The sinkhole server will be a dead end destination that does not
capture content from the infected computers. The sinkhole server, however, will
record the unique IP address and associated routing information of the infected
machine so that the FBI can alert the proper Internet Service Providers of the
the disruption effort. By notifying Internet Service Providers, the unwitting victims
can be alerted as to their status of victims and be assisted in the removal of Kelihos
request peer lists from the Golden Parachute Domains when they are unable to
reach any peers, the disruption effort will not be effective unless the domains are
also redirected to the sinkhole. In order to prevent LEVASHOV from using the
kept out of LEVASHOV's hands. The Temporary Restraining Order sought as part
of this action denies LEVASHOV these domains through an order to the Domain
Registries responsible for the U .S.-based top level domains requiring them to
68. Rule 41(e)(2) of the Federal Rules of Criminal Procedure requires that
the warrant command the law enforcement officer (a) "to execute the warrant
within a specified time no longer than 14 days" and (b) to "execute the warrant
during the daytime unless the judge for good cause expressly authorizes execution~
peer list at any time of day or night for 30 days after the date the warrant is
authorized. There is good cause to allow such a method of execution as the time of
specifically, the government has no control of the timing or when the infected
computers will access the peer list. In addition, the government seeks to transmit
the peer list and job messages for 30 days, because based on my training and -
experience I am aware that it may take many weeks to reach the thousands of
immediate results, computers that are powered off or not connected to the Internet
will not be redirected until they connect to the Internet, which could be weeks after
the initiation of the disruption. Because any privacy invasion that may occur
during this 30 day time period is minimal, and the benefits of continuing to disrupt
the Kelihos botnet are significant, the government believes that the extended time
Procedure 41(£)(3), I request that this Court authorize the officers executing the
warrant to delay notice until seven days after the technical measures authorized by
3:17-mj-00135-DMS
32
APR - 5 201 7
2705 . Providing immediate notice to the owners or users of the TARGET
disrupt the Kelihos botnet, which could tip off LEVASHOV or any as-yet
control of the botnet. Such a notification would seriously jeopardize the ongoing
direction could easily change the malware. Nearly the entire Kelihos botnet can be
updated within 24 hours. The Kelihos botnet has been updated in this manner
requested that this Court issue a search warrant authorizing the following:
b. that the government may receive and review, at any time of day
or night, within 30 days from the date the Court authorizes the use of
the specified interactive techniques, such IP and routing information
that is subsequently transmitted to a computer controlled by the FBI
or its private partners working under the direction and control of law
enforcement;
3: 17-mj-00135-DMS
33 APR - 5 201 7
c. that provision of a copy of the search warrant and receipt may,
in addition to any other methods allowed by law, be effectuated by
electronic delivery of true and accurate electronic copies (e.g., Adobe
PDF file) to any owners of affected computers by means of internet
publication;
Respectfully SlJ.bmitted,
Signature Redacted
ELLIOTT PETERSON
-
Special Agent
Federal Bureau of Investigation