Cyber security news for all

More

    Russian TrickBot Architect Gets 5-Year Term

    Vladimir Dunaev, a 40-year-old Russian citizen, has been handed a five-year and four-month prison sentence for his pivotal role in fabricating and disseminating the TrickBot malware, as declared by the U.S. Department of Justice (DoJ).

    This development transpired almost two months subsequent to Dunaev’s admission of guilt regarding computer fraud, identity theft, and conspiracy to perpetrate wire fraud and bank fraud.

    The DoJ elucidated, “Hospitals, schools, and businesses were amidst the myriad victims of TrickBot, grappling with losses amounting to tens of millions of dollars. While in operation, the TrickBot malware, serving as the primary intrusion vector into victim computer systems, was wielded to bolster diverse ransomware iterations.”

    Commencing as a banking trojan in 2016, TrickBot metamorphosed into a versatile tool capable of delivering supplementary payloads, notably ransomware. Following concerted efforts to dismantle the botnet, it became assimilated into the Conti ransomware operation in 2022.

    The cybercrime faction’s allegiance to Russia during the Russo-Ukrainian conflict resulted in a sequence of leaks known as ContiLeaks and TrickLeaks. This led to its shutdown in mid-2022, culminating in its fragmentation into numerous other ransomware and data extortion factions.

    Dunaev is reputed to have contributed specialized services and technical prowess to advance the TrickBot enterprise from June 2016 to June 2021, utilizing it to unleash ransomware on hospitals, schools, and businesses.

    Precisely, the accused devised browser alterations and malicious tools facilitating the extraction of credentials and sensitive data from compromised systems, while also enabling remote access. Additionally, he authored programs to thwart the detection of the TrickBot malware by legitimate security software.

    In a parallel case, Alla Witte, another TrickBot developer and a citizen of Latvia, received a sentence of two years and eight months in June 2023.

    News of Dunaev’s sentencing surfaces just days after the governments of Australia, the U.K., and the U.S. imposed financial sanctions on Alexander Ermakov, a Russian national associated with the REvil ransomware gang, for orchestrating the 2022 assault on health insurance provider Medibank.

    Cybersecurity entity Intel 471 revealed Ermakov’s online aliases, including blade_runner, GustaveDore, JimJones, aiiis_ermak, GistaveDore, gustavedore, GustaveDore, Gustave7Dore, ProgerCC, SHTAZI, and shtaziIT.

    Operating as JimJones, he was observed attempting to recruit unscrupulous penetration testers willing to provide login credentials for vulnerable organizations, all in exchange for $500 per access and a 5% share of the ransom proceeds.

    “These identifiers are linked to a broad spectrum of cybercriminal endeavors, encompassing network intrusions, malware development, and ransomware onslaughts,” the company stated, shedding light on his extensive cybercrime dossier.

    “Ermakov maintained a robust presence on cybercriminal forums, assuming roles as both a procurer and purveyor in the cybercrime-as-a-service landscape, functioning as a ransomware operator and affiliate. Indications suggest Ermakov’s involvement with a software development company specializing in both legitimate and illicit software development.”

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]