Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying


In Russia, the hacker ecosystem, perhaps more than any other place in the world, has It blows long time Cybercrime, between the state sponsored cyberscribers and spying. Now one accusation A group of Russian citizens and a group of botnets and Takeedown, a harmful program operation, the process of war in Ukraine, claimed how a harmful program operation was changed to spying on foreign governments.

Today, the US Department of Justice has announced criminal charges today by the law enforcement agencies of 16 people today, A complaint At least 300,000 cars in the world are infected. The announcement of the DOJ’s charges characterizes “Russia-based” and two of the suspects, Alexander Stepanov and Artem Alexandrovic Kalinkin, live in Novosibirsk, Russia. The other five suspected indictment is determined by the other nine, and only by pseudonims. In addition to these allegations, the Department of Justice, the investigation service of the defense – the criminal investigation of the Denating Operations of the Denabot Infrastructure in the world, including the United States.

Damabot also describes the second version of the harmful program used in spying for the indictment, military, government and NGO targets, except for a crime for profit. “Pervasive harmful programs such as Danabot suffer from hundreds of thousands of victims of the world, including sensitive military, diplomatic and government agencies, and many millions of dollars damage.”

Since 2018, a bank is infected with a bank Trojan, a bank trojan, which is first developed by the modular features of the world, which are the modular features of the world, originally modular features designed for credit card and cryptocutribal. Their creators were sold in a “branch group” in a branch group “in a branch group” in a “branch groups” in a “branch groups in a month of $ 3,000 per month, it was used as a means to install various forms of a large number of operations. The targets are also spread from the initial victims in Australia, Italy, Austria and Australia, both in Ukraine, Poland, Italy, Germany, Germany, Germany, Austria and Canada, Australia, Italy, Austria and Australia.

In 2021, according to Crowdstrike, Danabot, with millions of downloads in a JavaScript coding vehicle in a JavaScript coding vehicle, was used in a program supply chain attack. Crowdstrike found the victims of this concessive vehicle throughout the transport, technology and the media industry.

According to Selena Larson, the researcher in KiberiSecurity firm, “Danabot, who uses this scale and his crime,” Self-sight “, Selena Larson.

More unparallel, Danabot was also used in cases where the government-funded or hacked by the Russian government agency. In 2019 and 2020, a Hunting Western Government Officer’s representation in connection with the indictment of DOJ was openly used to target spying operations. According to SofrotIn these cases, a harmful program was handed over to the messengers in the enterprise of the Government of Europe and Kazakhstan.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *