Ransomware

searcher

Spider
Moderator
Benefactor
Messages
5,134
Reaction score
1,545
Points
213
From the link:

WASHINGTON (AP) — A man who authorities say participated in a ransomware campaign that extracted tens of millions of dollars from victims has been charged in the United States, the Justice Department announced Thursday.

Mikhail Vasiliev, a dual national of Russia and Canada, was arrested Wednesday. He is currently in custody in Canada and is awaiting extradition to the U.S. on charges that accuse him of involvement in the Lockbit ransomware operation.


*Edited because original link no longer worked.
 
Last edited:
...
Mikhail Vasiliev, a dual national of Russia and Canada, was arrested Wednesday. He is currently in custody in Canada and is awaiting extradition to the U.S. on charges that accuse him of involvement in the Lockbit ransomware operation.
...
Deputy Attorney General Lisa Monaco said in a statement that the arrest was the “result of over two-and-a-half-years of investigation into the LockBit ransomware group.”
...

31441_800.jpg
 
You'd think they would have hit one place, maybe two and called it good.

Pigs get fat, hogs get slaughtered.
 
I will say that share point has put an end to the ransomware risk once and for all in my opinion,

have been hit multiple times - never paid, just rebuilt. Sister company paid 1mm from insurance and they unlocked them.

was starting to restrict who,could send attachments, was blocking inbound emails from non company sources etc

now anyone can get themselves in a virus or ransomware situation and you just pull a backup from before they were hit and keep moving. Because everyone is isolated it’s doesn’t propagate as easy
 

Interpol’s seizes over $130m in virtual assets in operation HAECHI III​

The international police force closed a worldwide operation this week which covered over 1,600 cases.

By Claudia Glover
November 25, 2022

Interpol has seized $130m of virtual assets as part of an operation which concluded this week. Known as HAECHI III, it resolved 1,600 cases and saw the launch of a new anti-money laundering rapid response tool (ARRP) that enables countries to reclaim stolen money and digital assets.

Operation HAECHI III ran over a five-month period from June-November, targeting money and online currencies linked to cyber enabled financial crime and money laundering.

More:

 
So, what comes next? Asset forfeiture? More donations from Interpol to local crypto-Marxist political parties worldwide?

I no longer trust ANYTHING within Western governments. As we've seen, their political police are now enablers - for pedophile trafficking, child grooming, Depopulation, suppression of political opposition or of Rights movements by ordinary citizens.
 
So, what comes next? Asset forfeiture? More donations from Interpol to local crypto-Marxist political parties worldwide?

I no longer trust ANYTHING within Western governments. As we've seen, their political police are now enablers - for pedophile trafficking, child grooming, Depopulation, suppression of political opposition or of Rights movements by ordinary citizens.


You got that right.
 
That was nice of them to apologize and give them a decryptor. And they even got rid of the peeps who attacked the hospital. Shows they do have some scruples.
 
I seriously doubt that "the Hive" used a single point communication structure of a website (easily commandeered by authorities) to coordinate/operate. I could be wrong, but this seems more like window dressing than effective action.
 
I seriously doubt that "the Hive" used a single point communication structure of a website (easily commandeered by authorities) to coordinate/operate. I could be wrong, but this seems more like window dressing than effective action.
A fictional takedown.

Remember Fahrenheit 451? When the robotic salamander of the Fire Department, went out from burning a hidden library to pursue the perp. A vagrant was grabbed on the street and obliterated; and the Screens all announced that the dangerous radical was "apprehended."

Likewise, here. You don't believe the story, because it's illogical and too pat. But we're dealing with DUMMPFUX here...government bureaucrats, fat, dumb and happy; but pressured to show "results."
 
In February, attackers from the Russia-based BlackCat ransomware group hit a physician practice in Lackawanna County, Pennsylvania, that's part of the Lehigh Valley Health Network (LVHN). At the time, LVHN said that the attack “involved” a patient photo system related to radiation oncology treatment. The health care group said that BlackCat had issued a ransom demand, “but LVHN refused to pay this criminal enterprise.”

After a couple of weeks, BlackCat threatened to publish data stolen from the system. “Our blog is followed by a lot of world media, the case will be widely publicized and will cause significant damage to your business,” BlackCat wrote on their dark-web extortion site. “Your time is running out. We are ready to unleash our full power on you!” The attackers then released three screenshots of cancer patients receiving radiation treatment and seven documents that included patient information.

 
A team of ransomware hackers have published proprietary inside data allegedly obtained the Dutch shipping intelligence agency Royal Dirkzwager, according to cybsersecurity trade press. The leak purportedly include employee passports, contracts and other sensitive information. The hackers claim to have more data that is yet to be released, reports Security Week.

 

Linus Tech Tips channel hacked by crypto currency hackers​

Mar 23, 2023


Sad to see that hackers have erased and destroyed the work of a popular tech YouTuber 4:47
 
Owners of MSI-brand motherboards, GPUs, notebooks, PCs, and other equipment should exercise caution when updating their device's firmware or BIOS after the manufacturer revealed it has recently suffered a cyberattack.…

In a statement shared on Friday, MSI urged users "to obtain firmware/BIOS updates only from its official website," and to avoid using files from other sources.

 

US government agencies hit in global hacking spree​

(Reuters) -The U.S. government has been hit in a global hacking campaign that exploited a vulnerability in widely used software but does not expect it to have significant impact, the nation's cyber watchdog agency said on Thursday.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said several federal bodies had experienced intrusions following the discovery of a weakness in the file transfer software MOVEit, Eric Goldstein, the agency's executive assistant director for cybersecurity, said in a statement.

More:

 

U.S. Energy Dept gets two ransom notices as MOVEit hack claims more victims​

June 16, 20236:29 PM EDT

WASHINGTON, June 16 (Reuters) - The U.S. Department of Energy got ransom requests from the Russia-linked extortion group Cl0p at both its nuclear waste facility and scientific education facility that were recently hit in a global hacking campaign, a spokesperson said on Friday.

The DOE contractor Oak Ridge Associated Universities and the Waste Isolation Pilot Plant, the New Mexico-based facility for disposal of defense-related radioactive nuclear waste, were hit in the attack, which was first reported on Thursday.

More:

 
Back
Top Bottom