US affords $2.5 million reward for hacker linked to Angler Exploit Equipment

The U.S. Division of State and the Secret Service have introduced a reward of $2,500,000 for info resulting in Belarusian nationwide Volodymyr Kadariya (Владимир Кадария) for cybercrime actions.

The 38-year-old man is needed for his participation in numerous malware and on-line rip-off operations, together with the Angler Exploit Equipment, for which he managed malvertising operations between October 2013 and March 2022.

“The U.S. Department of State is offering a reward of up to $2.5 million for information leading to the arrest and/or conviction in any country of Volodymyr Kadariya for his alleged participation in a significant malware organization,” reads an announcement on the U.S. Division of State web site.

The hacker, recognized on-line by numerous aliases together with “Stalin,” “Eseb,” and “baxus,” was first indicted with wire and laptop fraud in June 2023, however the indictment was unsealed solely on August 12, 2024.

At the moment, Kadariya was recognized as certainly one of Maksim Silnikau’s co-conspirators, who participated in global-scale malware distribution operations with Andrei Tarasov.

Silnikau (aka “J.P. Morgan”), the creator and operator of Ransom Cartel, Reveton ransomware, and Angler Exploit Equipment, was arrested in Spain and later extradited to america, the place he faces a number of expenses incurring sentences of as much as 100 years in jail.

Volodymyr Kadariya
Volodymyr Kadariya
Supply: U.S. Secret Service

The Angler Exploit Equipment

Angler Exploit Equipment first appeared round 2013, shortly gaining prominence for its potential to leverage exploits in outdated software program like Adobe Flash, Java, Silverlight, and Web Explorer, to ship malware payloads onto the victims’ methods.

One of many widespread vectors for Angler was malvertising, the place malicious commercials had been positioned on respectable web sites, which Kadariya was concerned in.

Angler Exploit Equipment’s operations started to wane round mid-2016, and by the tip of that yr, the exploit equipment was thought-about now not lively. Its legacy and affect on victims worldwide, although, stay vital.

Other than the Angler Exploit Equipment, Kadariya additionally employed “scareware” advertisements to convey pretend messages to web customers, tricking them into downloading malicious information on their computer systems or disclosing private and monetary info on phishing pages.

The Belarusian cybercriminal loved many monetization channels, together with promoting “logs” of stolen knowledge to different cybercriminals, promoting direct entry to methods compromised by Angler Exploit Equipment, and permitting deployment of customized payloads by means of it.

Proper now, the whereabouts of Kadariya are unknown, and any info resulting in his arrest or conviction will grant tipsters as much as $2,500,000.

Recent articles

Researchers Warn of Privilege Escalation Dangers in Google’s Vertex AI ML Platform

Nov 15, 2024Ravie LakshmananSynthetic Intelligence / Vulnerability Cybersecurity researchers have...

How AI Is Reworking IAM and Id Safety

Lately, synthetic intelligence (AI) has begun revolutionizing Id Entry...

Vietnamese Hacker Group Deploys New PXA Stealer Focusing on Europe and Asia

Nov 15, 2024Ravie LakshmananMalware / Credential Theft A Vietnamese-speaking risk...

Excessive-Severity Flaw in PostgreSQL Permits Hackers to Exploit Surroundings Variables

Nov 15, 2024Ravie LakshmananVulnerability / Database Safety Cybersecurity researchers have...