OCT 26 20 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA CLERK. U.fj. r :.rr Alexandria Division iOniA. VIPGl'f^iA' '-.OJRT MICROSOFT CORPORATION, a Washington corporation, Plaintiff, ###### Civil Action No: I] )'7' '^\l' ^ V. JOHN DOES 1-2, CONTROLLING A COMPUTER NETWORK AND THEREBY FILED UNDER SEAL PURSUANT TO INJURING PLAINTIFF AND ITS LOCAL RULE 5 CUSTOMERS, Defendants. COMPLAINT I. INTRODUCTION 1. Plaintiff MICROSOFT CORP. ("Microsoft") hereby complains and alleges that JOHN DOES 1-2 (collectively "Defendants"), have established an Internet-based cyber-theft operation referred to as "Barium." Through Barium, Defendants are engaged in breaking into the Microsoftaccountsand computernetworks of Microsoft's customersand stealinghighly sensitive information. To manage and direct Barium, Defendants have establishedand operate a network ###### of websites, domainsand computers on the Internet, which they use to target their victims, infect their computing devices, compromise the security of their networks, and steal sensitive ###### information. Accounts and profiles usedby Defendants on certainpublicly accessible websites to operate Barium are set forth at Appendix A and are referred to as the "Barium Profiles." Internet ###### domains used by Defendants to operate Barium aresetforth at AppendixBto this Complaint and arereferred to asthe "Barium Command and Control Domains." Microsoft alleges as follows: ----- II. NATURE OF ACTION 2. This is an action based upon: (1) The Computer Fraud and Abuse Act, 18 U.S.C. § 1030; (2) Electronic Communications Privacy Act, 18 U.S.C. § 2701; (3) Trademark Infringement under the Lanham Act, 15 U.S.C. § 1114 et seq. (4) False Designation of Origin under the Lanham Act, 15 U.S.C. § 1125(a); (5) Trademark Dilution under the Lanham Act, 15 U.S.C. § 1125(c); (6) common law trespass to chattels; (7) unjust enrichment; (8) conversion; and (9) intentional interference with contractual relationships. Microsoft seeks injunctive and other equitable relief and damages against Defendants who operate and control a network of computers that include the Barium Profiles and the Barium Command and Control Domains. Defendants, through their illegal activities involving Barium, have caused and continue to cause irreparable injury to Microsoft, its customers and licensees, and the public. III. PARTIES 3. PlaintiffMicrosoft is a corporation duly organized and existing under the laws of the State of Washington, having its headquarters and principal place of business in Redmond, Washington. 4. On information and belief, the Defendants control the Barium Profiles and the Barium Command and Control Domains in ftirtherance of conduct designed to cause harm to Microsoft, its customers and licensees, and the public. Microsoft is informed and believes and thereupon alleges that Defendants can likely be contacted directly or through third-parties using the information set forth in Appendix B. 5. Third parties VeriSign, Inc., VeriSign Information Services, Inc., and VeriSign Global ###### Registry Services (collectively, "VeriSign") maintain the domain name registry that oversee the registration ofall domain names ending in".com." VeriSign Information Services, Inc., VeriSign, Inc.andVeriSign Global Registry Services arelocated at 12061 Bluemont Way, Reston, Virginia 20190. ###### 6. Set forth in Appendix B is the identity of and contact information for the third-party domain registry that controls the domains usedby the Defendants. 7. Set forth inAppendix A are the accounts and profiles that the Defendants use to operate ----- and configure Barium malware. 8. On information and belief, Defendantsjointly own, rent, lease, or otherwise have dominion over the Barium Profiles, the Barium Command and Control Domains, and related infrastructure, and through those control and operate Barium. Microsoft will amend this Complaint to allege the Defendants' true names and capacities when ascertained. Microsoft will exercise due diligence to determine Defendants' true names, capacities, and contact information, and to effect service upon those Defendants. 9. Microsoft is informed and believe and thereupon alleges that each ofthe fictitiously named Defendants is responsible in some manner for the occurrences herein alleged, and that Microsoft's injuries as herein alleged were proximately caused by such Defendants. 10. On information and belief, the actions and omissions alleged herein to have been undertaken by Defendants were actions that Defendants, and each ofthem, authorized, controlled, directed, or had the ability to authorize, control or direct, and/or were actions and omissions each Defendant assisted, participated in, or otherwise encouraged, and are actions for which each Defendant is liable. Each Defendant aided and abetted the actions of Defendants set forth below, in that each Defendant had knowledge of those actions and omissions, provided assistance and benefited fi-om those actions and omissions, in whole or in part. Each Defendant was the agent of each of the other Defendant, and in doing the things hereinafter alleged, was acting within the course and scope of such agency and with the permission and consent of other Defendant. IV. JURISDICTION AND VENUE 11. The Court has subject matter jurisdiction over this action pursuant to 28 U.S.C. § 1331 becausethis action arises out of Defendants' violation of the FederalComputerFraud and Abuse Act (18 U.S.C. § 1030), Electronic Communications Privacy Act (18 U.S.C. § 2701), and the ###### Lanham Act (15 U.S.C. §§ 1114, 1125). The Court also has subject matterjurisdiction over Microsoft's claims for trespass to chattels, unjust enrichment, conversion, and intentional ###### interference with contractual relationships pursuantto 28 U.S.C. § 1367. 12. Venue is proper in this judicial district pursuant to 28 U.S.C. § 1391(b) because a ----- substantial part of the events or omissions giving rise to Microsoft's claims has occurred in this judicial district, because a substantial part of the property that is the subject of Microsoft's claims is situated in this judicial district, and because a substantial part of the harm caused by Defendants has occurred in this judicial district. Defendants maintain Internet domains registered in Virginia, engage in other conduct availing themselves of the privilege of conducting business in Virginia, and have utilized instrumentalities located in Virginia and the Eastern District of Virginia to carry out the acts of which Microsoft complains. 13. Defendants have affirmatively directed actions at Virginia and the Eastern District of Virginia by directing malicious computer code at the computing devices and high-value computer networks of individual users and entities located in Virginia and the Eastern District of Virginia, attempting to and in fact infecting those computing devices with malicious code to compromise the security of those systems, and attempting to and in fact stealing sensitive information from those networks, all to the grievous harm and injury of Microsoft, its customers and licensees, and the public. Figure 1, below, depicts the geographical location of user computers in and around the Eastern District of Virginia, against which Defendants are known to have directed fraudulent acts and malicious code, attempting to and in fact infecting those computers, thereby compromising their security and subjecting them to theft of sensitive information. ----- Figure 1 OiUjod . 1 Mtlcon BnmtMick•$> En<©tt Cily-\f I• ^^\UlCM \s«^, \Oat*t DcnnOvHW PhHhspi PJrtom atttlaWarr edf - , 9 vnoi Pclfttbufo - tt ^ n - / WoodttUk "S5i«f*- lo« V MMod iv-i\ - C»p' W«r«tM« 'Alei^ndnj Coocgttonfn 0Mr' Wttsto Stonamch - R com nolp«dcom ### @ nostay88@gmatl.com ----- D. Barium's Method Of Compromising And Stealing Information From Victims 19. The Barium Defendants have employed at least two methods of compromising victim computers. The first method, described in Part D.l, below, involves the "Barlaiy" and "PlugXL" malware, which the Barium Defendants propagate using phishing techniques. The second method, described in Part D.2, below, involves the "ShadowPad" malware, which the Barium Defendants have distributed via a third-party software provider's compromised update. 1. Barium Method 1; "Barlaiv** And "PlugXL" Malware a. Barium Defendants Deliver ^^Barlaiy" And 'TlugXL" Malware Using Phishing Attacks 20. After selecting a victim organization. Barium will identify individuals employed by that organization and attempt to ascertain their personal or work e-mail addresses. To enhance the effectiveness of phishing attacks into the organization, Barium will collect additional background informationfrom social media sites. Employing a technique known as "spear phishing," Barium has heavily targeted individualswithin Human Resources or BusinessDevelopmentdepartments of the targeted organizations in order to compromise the computers of such individuals. 21. In a typical spear phishing attack. Barium sends the targeted individual an e-mail specifically crafted to induce that individual to take some action that will lead to the compromise of their computer. Using the information gathered from its reconnaissance on social media sites, Barium packages the phishing e-mail in a way that gives the e-mail credibility to the target user, often by making the e-mail appear as if it were sent from an organization known to and trusted by the victim or concerning a topic of interest to the victim. Barium uses the lure of a resume or ###### documents relatedto a currentknownprojectthat the targetmay be developing. 22. Figure 2 depicts an example of such a spear phishing e-mail directed to a potential victim who is a customer and user of Microsoft's Hotmail e-mail service: ----- Figure 2 Jim Hugnes