Cyber security news for all

More

    Feds Arrest Member of Fin7, Group Tied to a Billion Dollars Worth of Hacks

    Authorities are one step closer to curbing the notorious hacking crew- Fin7; which has pulled in as much as a billion dollars worth of illegal revenue, as authorities have arrested an alleged member

    This arrest follows previous ones made in 2018 by the Justice Department (U.S.) when they arrested three Ukrainians for their roles as I.T. administrators in Fin7. Of the arrested three, one, Fedir Hladyr, pleaded guilty to the accusations.

    Seamus Hughes, deputy director of the program on extremism at George Washington University, discovered and shared the court docket with journalists. The unsealed court records listed the criminal pattern and relevant information about the criminal activities of the infamous group. From the records:

    • The group’s M.O. involves sending spoof emails to unsuspecting people who install the malware, giving access to their system. The stolen credit cards ended up on Joker’s Stash (a cybercriminal marketplace). The group also targeted public enterprises like Whole Food, Trump’s Place, Jason Deli, Arby’s, and casinos.
    • The arrested Ukrainian, Denys Iarmak, who also went by GakTus, was extradited from Thailand.

    Complaints

    The complaint laid against Iarmak reads, “Like other members of the group, IARMAK provided his true name to receive payment for his work in furtherance of the group.” It also adds, “in chat logs dating from 2017, Iarmak provided another member of Fin7 with user credentials for a compromised U.S. business as well as internal system information from a target.”

    In a censored version of the November 2019 complaints against Iarmak, FBI Special Agent Briana L. Neumiller wrote, “the hacking group remains incredibly active.”

     

    The group is professional and has an organized administrative system that monitors its I.T. infrastructure. They employ the use of sophisticated apps, like Hipchat and JIRA, for interviews and also flagging issues to one another. One of the techniques used allows the group to determine if an A.V product detects their malware as malicious. To lend credence to his organization, Iarmak contracted a cybersecurity firm to develop an antivirus program; and even created fake penetration testing companies, all to make the organization look legit.

     

     

    Recent Articles

    Judge issues injunction against WeChat

    The US government wanted to take action against the app WeChat. A judge stood sideways. The app should disappear from the platforms in the...

    Mail provider Tutanota becomes target of cyber attacks

    Over the weekend, ongoing DDoS attacks and an infrastructure problem resulted in downtime for hundreds of users. While some were able to mitigate most...

    Amazon accounts are the new target of cyber criminals

    Amazon is a popular target for cyber criminals who want to exploit the trust and image of the company among its customers with emails....

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox