Brian Krebs | |
---|---|
Born | 1972 (age 52–53) Alabama, U.S. |
Education | B.A. inInternational Relations,George Mason University, 1994 |
Occupation(s) | Security journalist Investigative reporter |
Organization | The Washington Post (1995–2009) |
Known for | Coverage of profit-seekingcybercriminals |
Website | krebsonsecurity |
Brian Krebs (born 1972) is an Americanjournalist andinvestigative reporter. He is best known for his coverage of profit-seekingcybercriminals.[1] Krebs is the author of a dailyblog, KrebsOnSecurity.com, coveringcomputer security andcybercrime. From 1995 to 2009, Krebs was a reporter forThe Washington Post and covered tech policy, privacy and computer security as well as authoring theSecurity Fix blog.
Born in 1972 inAlabama,[1] Krebs earned aB.A. inInternational Relations fromGeorge Mason University in 1994.[2] His interest in cybercriminals grew after acomputer worm locked him out of his own computer in 2001.[1]
Krebs started his career atThe Washington Post in the circulation department. From there, he obtained a job as a copy aide in the Post newsroom, where he split his time between sorting mail and taking dictation from reporters in the field. Krebs also worked as an editorial aide for the editorial department and the financial desk. In 1999, Krebs went to work as a staff writer for Newsbytes.com, a technology newswire owned byThe Washington Post.[3]
When thePost sold Newsbytes in 2002, Krebs transitioned to Washingtonpost.com inArlington, Virginia as a full-time staff writer. Krebs's stories appeared in both the print edition of the paper and Washingtonpost.com. In 2005, Krebs launched theSecurity Fix blog, a daily blog centered around computer security, cyber crime and tech policy. In December 2009, Krebs left Washingtonpost.com and launched KrebsOnSecurity.com.
Krebs has focused his reporting at his blog on the fallout from the activities of several organized cybercrime groups operating out ofeastern Europe that have stolen tens of millions of dollars from small to mid-sized businesses throughonlinebanking fraud.[4] Krebs has written more than 75 stories about small businesses and other organizations that were victims of online banking fraud, an increasingly costly and common form of cybercrime.
Krebs wrote a series of investigative stories that culminated in the disconnection or dissolution of several Internet service providers that experts said catered primarily to cyber criminals. In August 2008, a series of articles he wrote forThe Washington Post'sSecurity Fix blog led to the unplugging of anorthern California based hosting provider known as Intercage or Atrivo.[5]
During that same time, Krebs published a two-part investigation on illicit activity at domain name registrarEstDomains, one of Atrivo's biggest customers, showing that the company's president, Vladimir Tšaštšin, recently had been convicted ofcredit card fraud, document forgery andmoney laundering.[6] Two months later, theInternet Corporation for Assigned Names and Numbers (ICANN), the entity charged with overseeing the domain registration industry, revoked EstDomains' charter, noting that Tšaštšin's convictions violated an ICANN policy that prohibits officers of a registrar from having a criminal record.[7] In November 2011, Tšaštšin and five other men would be arrested byEstonian authorities and charged with running a massiveclick fraud operation with the help of the DNS Changer Trojan.[8]
In November 2008, Krebs published an investigative series that led to the disconnection ofMcColo, another northern California hosting firm that experts said was home to control networks for most of the world's largestbotnets.[9] As a result of Krebs's reporting, both of McColo's upstream Internet providers disconnected McColo from the rest of the Internet, causing an immediate and sustained drop in the volume ofjunk e-mail sent worldwide. Estimates of the amount and duration of the decline in spam due to the McColo takedown vary, from 40 percent to 70 percent, and from a few weeks to several months.[10]
Krebs is credited with being the first journalist, in 2010, to report on the malware that would later become known asStuxnet.[11] In 2012, he was cited in a follow-up to another breach ofcredit anddebit card data, in this case potentially more than 10 million Visa and MasterCard accounts with transactions handled byGlobal Payments Inc. ofAtlanta, Georgia.[12]
On March 14, 2013, Krebs became one of the first journalists to become a victim ofswatting.[13]
On December 18, 2013, Krebs broke the story thatTarget Corporation had been breached of 40 million credit cards. Six days later, Krebs identified a Ukrainian man who Krebs said was behind a primary black market site selling Target customers' credit and debit card information for as much asUS$100 apiece.[14] In 2014, Krebs published a book calledSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door, which went on to win a 2015PROSE Award.[15][16]
In 2016, Krebs's blog was the target of one of the largest everDDoS attacks using theMirai malware,[17] apparently in retaliation for Krebs's role in investigating the vDOS botnet.[18][19][20]Akamai, which was hosting the blog on apro bono basis, quit hosting his blog as a result of the attack, causing it to shut down.[21] As of September 25, 2016[update],Google'sProject Shield had taken over the task of protecting his site, also on apro-bono basis.[22]
An article by Krebs on 27 March 2018 on KrebsOnSecurity.com about the mining software company and script "Coinhive" where Krebs published the names of admins of the Germanimageboardpr0gramm, as a former admin is the inventor of the script and owner of the company, was answered by an unusual protest action by the users of that imageboard. Using the pun of "Krebs" meaning "Cancer" inGerman, they donated to charitable organisations fighting against those diseases, collecting more than 200,000 Euro of donations until the evening of 28 March to theDeutsche Krebshilfe charity.[23]
Prior to 2021, his investigation ofFirst American Financial's prior data breach led to an SEC investigation that concluding that "ensuing company disclosures preceded executives’ knowledge of unaddressed, months-old IT security reports."[24]
Topics of Krebs's work: