Jump to content


From Wikipedia, the free encyclopedia
TypeTrojan horse
SubtypeRemote administration trojan
Isolation datec. 2010[1]
AuthorsAlex Yucel and Michael Hogue[1]
Technical details

Blackshades is a malicious trojan horse used by hackers to control infected computers remotely. The malware targets computers using operating systems based on Microsoft Windows.[2] According to US officials, over 500,000 computer systems have been infected worldwide with the software.[3]

In 2014, the United States Federal Bureau of Investigation (FBI) arrested hundreds of people who had Blackshade in their computer. Before the FBI crackdown, Blackshades was sold for US$40 on Hack Forums, and reportedly generated US$350,000 in sales.[1]



Blackshades infects computer systems by downloading onto a victim's computer when the victim accesses a malicious webpage (sometimes downloading onto the victim's computer without the victim's knowledge, known as a drive-by download) or through external storage devices, such as USB flash drives.[4] Blackshades has the ability to infect and hack multiple computers from the release of a bait that the hacker can make use of, an improved version of blackshades was released shortly after the original release of the primary version, when hacking organizations like Octagonun and Cyber-Sec, decided to develop special features for coupling to the software such as undetectability, DDoS / TCP Flood, and backdoor persistence features.[1]

Blackshades can reportedly be used remotely to access an infected computer without authorization. Blackshades allows hackers to perform many actions on an infected computer remotely without authorization, including the ability to:[1][5]

  • Access and modify files on the victim's computer.
  • Log keystrokes on the victim's computer.
  • Access to the webcam of the victim.
  • Make all infected computers subordinate to DDoS attack commands, using them as robots to carry out extremely effective attacks against targets.
  • Download and execute files on the victim's computer.
  • Use the victim's computer as a proxy server.

Blackshades reportedly can be used by computer hackers with little experience or by script kiddies, hackers that use programs developed by others to attack computer systems.[1]

Blackshades can also act as ransomware. Hackers using Blackshades can restrict access to the victim's computer and demand a ransom paid to the hacker in order for the restriction to be lifted.[5]

Detection and removal


Many antivirus programs can successfully detect and remove Blackshades, however hackers using the Blackshades software usually avoid detection of Blackshades infections by using software that obfuscates the Blackshades binary to avoid detection by antivirus programs, which the Blackshades organization also sold along with the Blackshades software.[5][6]

Blackshades in the media


In 2012, Citizen Lab and EFF reported on the use of Blackshades to target opposition forces in Syria.[7]

In 2015, Stefan Rigo from Leeds was given a 40-week suspended sentence for using BlackShades against 14 people, 7 of whom he knew personally. It is reported he paid for the software using his ex-girlfriend's payment card.[8]

In 2013, Cassidy Wolf was a victim of sextortion, after photographs of her were hacked and used in an attempt to blackmail her after being Miss Teen USA 2013.[9][10][11] The FBI ran a probe after Wolf reported a threatening email demanding a 'special performance' for the hacker, whom she suspected to be Jared James Abrahams, her former high school classmate. Wolf never created the video demanded, and on September 26, 2013, Abrahams surrendered to FBI agents in Orange County.[citation needed] In November 2013, Abrahams pleaded guilty to hacking over 100-150 women and installing the highly invasive malware Blackshades on their computers in order to obtain nude images and videos of them. One of his victims was a 14-year-old girl.[12] On March 18, 2014; Abrahams was sentenced to 18 months in federal prison.[13] Legal scholar Star Kashman speculates that Abrahams used the technique of Google Dorking to find and target Cassidy Wolf's webcam online, leading to the act of sextortion.[14]

FBI crackdown


In 2012, the FBI ran a sting operation called "Operation Card Shop", which led to 24 arrests of hackers in eight countries. One of those arrested was Michael Hogue (also known as xVisceral in online hacking communities). Hogue, a co-creator of Blackshades, was arrested and indicted on charges under 18 U.S.C. § 1030, more commonly known as the Computer Fraud and Abuse Act. He was sentenced to five years of probation, 20 years suspended prison sentence.[4][15]

In 2014, the FBI coordinated a worldwide operation to combat the use of the malware, leading to the arrest of almost one hundred people in nineteen countries.[3] On May 19, charges were laid in the United States against five individuals: two men identified as developers of Blackshades and three other men who sold the software or used it to infiltrate other people's computers.[16] Exactly 359 searches were conducted and more than 1,100 electronic devices have been seized as part of the operation.[16] According to the FBI, over 500,000 computers in more than 100 countries were infected by the malware.[17] Blackshades sold typically for US$40, and reportedly generated US$350,000 in sales.[1]


  1. ^ a b c d e f g "Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce Charges In Connection With Blackshades Malicious Software That Enabled Users Around The World To Secretly And Remotely Control Victims' Computers". United States Department of Justice. May 19, 2014. Retrieved December 13, 2014.
  2. ^ "Could your Computer be Infected by Blackshades?". FBI. Retrieved May 20, 2014.
  3. ^ a b "BlackShades: Arrests in computer malware probe". BBC News. 2014-05-19. Retrieved 19 May 2014.
  4. ^ a b Loyd, Jordan (June 19, 2012). "U.S. v. Michael Hogue Complaint" (PDF). blackshades.net. United States Department of Justice. Archived from the original (PDF) on December 26, 2014.
  5. ^ a b c Kujawa, Adam (June 15, 2012). "You Dirty RAT! Part 2 – BlackShades NET". Malwarebytes UNPACKED. Malwarebytes Corporation. Retrieved December 31, 2014.
  6. ^ Hoffman, Patrick (May 16, 2014). "U.S. v. Brendan Johnston Complaint 14 Mag 1086" (PDF). United States Department of Justice. p. 8.
  7. ^ Marquis-Boire, Morgan; Hardy, Seth (June 19, 2012). "Syrian Activists Targeted with Blackshades Spy Software".; Marquis-Boire, Morgan; Galperin, Eva (July 12, 2012). "New Malware Targeting Syrian Activists Uses Blackshades Commercial Trojan".
  8. ^ Rigo, Stefan (October 8, 2015). "Webcam hacker spied on sex acts with BlackShades malware - BBC News". BBC News.;
  9. ^ "Cassidy Wolf: Miss Teen USA 'Sextortion Victim'". Sky News. August 16, 2013. Archived from the original on June 10, 2016. Retrieved September 12, 2013.
  10. ^ "Cassidy Wolf, Miss Teen USA, claims she was extorted by an online hacker, report says". CBS News. August 14, 2013. Archived from the original on November 21, 2013. Retrieved September 12, 2013.
  11. ^ "Miss Teen USA hacker jailed for 18 months". BBC News. March 18, 2014. Archived from the original on November 22, 2017. Retrieved June 20, 2018.
  12. ^ Moss, Caroline (March 18, 2014). "Hacker Who 'Sextorted' Miss Teen USA Gets 18 Months In Prison". Business Insider. Archived from the original on December 25, 2016. Retrieved March 19, 2014.
  13. ^ "Miss Teen USA webcam hacker Jared James Abrahams sentenced to 18 months in prison". The Independent. March 18, 2014. Archived from the original on October 5, 2017. Retrieved March 19, 2014.
  15. ^ "Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of International Cyber Crime Takedown". The United States Attorney Office for the Southern District of New York. Archived from the original on 2015-01-01.
  16. ^ a b "BlackShades malware bust ends in nearly 100 arrests worldwide". CBS Interactive. May 19, 2014. Retrieved 20 May 2014.
  17. ^ "More than half million computers worldwide infected with BlackShades malware". Big News Network. Retrieved May 20, 2014.