Remove 2019 Remove Cybercrime Remove Encryption Remove System Administration
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that have happened in the past five years.

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

GandCrab dissolved in July 2019, and is thought to have become “ REvil ,” one of the most ruthless and rapacious Russian ransomware groups of all time. “The command requires Windows system administrators,” Truniger’s ads explained. “Experience in backup, increase privileges, mikicatz, network.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak. Hladyr also controlled the organization’s encrypted channels of communication.”

article thumbnail

Dissecting the malicious arsenal of the Makop ransomware gang

Security Affairs

Their operations are based on the human operator ransomware practice where most of the intrusion is handled by hands-on keyboard criminals, even in the encryption stage. The Makop criminals were recently using version 2.5.3869 of the tool, which dates back to 2019. Advanced_Port_Scanner_2.5.3869.exe

article thumbnail

FIN7 sysadmin behind “billions in damage” gets 10 years

Malwarebytes

In 2018 three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe were arrested and taken into custody by US authorities. Hladyr also controlled the organization’s encrypted channels of communication. The conviction. According to acting US Attorney Tessa M.

article thumbnail

Kaseya Ransomware Supply-Chain Attack: What We Know So Far

Digital Shadows

On 02 July 2021, details started to emerge of a sophisticated supply-chain attack targeting Kaseya VSA, virtual system administrator software used to manage and monitor customers’ infrastructure. Consequently, it makes sense for them to encrypt the compromised networks and demand a ransom to restore them.

article thumbnail

Ransomware Gangs and the Name Game Distraction

Krebs on Security

Reinvention is a basic survival skill in the cybercrime business. But a little more than a month later, a new ransomware affiliate program called BlackMatter emerged, and experts quickly determined BlackMatter was using the same unique encryption methods that DarkSide had used in their attacks.