Remove 2010 Remove Antivirus Remove Cryptocurrency Remove Ransomware
article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. According to Constella, this email address was used in 2010 to register an account for a Dmitry Yurievich Khoroshev from Voronezh, Russia at the hosting provider firstvds.ru.

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

The crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were terminating the program after allegedly having earned more than $2 billion in extortion payouts from victims. Image: Malwarebytes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

.” Pavel Vrublevsky is a convicted cybercriminal who became famous as the CEO of the Russian e-payments company ChronoPay , which specialized in facilitating online payments for a variety of “high-risk” businesses, including gambling, pirated Mp3 files, rogue antivirus software and “male enhancement” pills.

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Ransomware, for example, usually doesn’t self-replicate. Though polite, the Creeper was still an annoyance to some, and in 1971, Ray Tomlinson developed the first antivirus software , called Reaper. One of the first pieces of antivirus software , McAfee’s VirusScan, was released in 1987. Going Mobile and Going Global: 2001-2010.

Malware 140
article thumbnail

New Cyberthreats for 2021

Adam Levin

Ransomware was a relatively obscure form of malware until the early 2010s , but it has increased in scope and the amount of damage it has caused year after year, aided by a proliferation of botnets , cryptocurrencies , and sophisticated criminal enterprises. At the beginning of 2020, U.S.

IoT 130
article thumbnail

Mystic Stealer

Security Boulevard

Oftentimes this is credential data, but it can be any data that may have financial value to an adversary; this includes paid online service accounts, cryptocurrency wallets, instant messenger, or email contacts lists, etc. Key Mystic Stealer functions include its ability to extract data from web browsers and cryptocurrency wallets.