Ukraine Police Arrest Suspect Linked to LockBit and Conti Ransomware Teams

Jun 13, 2024NewsroomCyber Crime / Ransomware

The Cyber Police of Ukraine has introduced the arrest of an area man who’s suspected to have provided their providers to LockBit and Conti ransomware teams.

The unnamed 28-year-old native of the Kharkiv area allegedly specialised within the improvement of crypters to encrypt and obfuscate malicious payloads with the intention to evade detection by safety applications.

The product is believed to have been provided to the Conti and LockBit ransomware syndicates that then used the crypter to disguise the file-encrypting malware and launch profitable assaults.

“And at the end of 2021, members of the [Conti] group infected the computer networks of enterprises in the Netherlands and Belgium with hidden malware,” in response to a translated model of the assertion launched by the company.

As a part of the investigation, authorities carried out searches in Kyiv and Kharkiv, and seized pc tools, cell phones, and notebooks. If discovered responsible, the defendant is anticipated to withstand 15 years in jail.

Information of the arrest was additionally echoed by the Dutch Politie, which mentioned the person was arrested as a part of Operation Endgame on April 18, 2024.

Cybersecurity

“The Conti group has used several botnets that were also the subject of research within Operation Endgame,” the Politie mentioned earlier this month.

“In this way, the Conti group gained access to companies’ systems. By targeting not only the suspects behind the botnets, but also the suspects behind the ransomware attacks, this form of cybercrime is dealt a major blow.”

In latest months, regulation enforcement authorities have engaged in a sequence of arrests and takedowns to fight cybercrime. Final month, the U.S. Justice Division introduced the arrest of a Taiwanese nationwide named Rui-Siang Lin in connection along with his possession of an unlawful darkish internet narcotics market known as the Incognito Market.

Lin can be mentioned to have launched a service known as Antinalysis in 2021 underneath the alias Pharoah, an internet site designed to investigate blockchains and let customers test whether or not their cryptocurrency might be related to felony transactions for a payment.

The darknet bazaar attracted consideration earlier this March when its website went offline in an exit rip-off of types, solely to reappear a number of days later with a message extorting all of its distributors and consumers, and threatening to publish cryptocurrency transactions and chat data of customers except they paid anyplace between $100 and $20,000.

“For nearly four years, Rui-Siang Lin allegedly operated ‘Incognito Market,’ one of the largest online platforms for narcotics sales, conducting $100 million in illicit narcotics transactions and reaped millions of dollars in personal profits,” James Smith, the assistant director in control of the FBI New York discipline workplace, mentioned.

Cybersecurity

“Under the promise of anonymity, Lin’s alleged operation offered the purchase of lethal drugs and fraudulent prescription medication on a global scale.”

Based on information compiled by blockchain evaluation agency Chainalysis, darknet markets and fraud retailers obtained $1.7 billion in 2023, indicating a rebound from 2022 for the reason that closure of Hydra early that 12 months.

The event comes as GuidePoint Safety revealed {that a} present affiliate of the RansomHub ransomware group, who was beforehand a BlackCat affiliate, additionally has connections with the notorious Scattered Spider gang based mostly on overlaps in noticed techniques, strategies, and procedures (TTPs).

This encompasses using social engineering assaults to orchestrate account takeovers by reaching out to assist desk personnel to provoke account password resets and the concentrating on of CyberArk for credential theft and lateral motion.

“User education and processes designed to verify the identity of callers are the two most effective means of combating this tactic, which will almost always pass undetected unless reported by employees,” the corporate mentioned.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles

INTERPOL Pushes for

Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is...

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

Dec 18, 2024Ravie LakshmananCyber Assault / Vulnerability Risk actors are...