Ransomware

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213
From the link:

WASHINGTON (AP) — A man who authorities say participated in a ransomware campaign that extracted tens of millions of dollars from victims has been charged in the United States, the Justice Department announced Thursday.

Mikhail Vasiliev, a dual national of Russia and Canada, was arrested Wednesday. He is currently in custody in Canada and is awaiting extradition to the U.S. on charges that accuse him of involvement in the Lockbit ransomware operation.


*Edited because original link no longer worked.
 
Last edited:

pmbug

Your Host
Administrator
Messages
10,223
Reaction score
2,603
Points
268
Location
Texas
...
Mikhail Vasiliev, a dual national of Russia and Canada, was arrested Wednesday. He is currently in custody in Canada and is awaiting extradition to the U.S. on charges that accuse him of involvement in the Lockbit ransomware operation.
...
Deputy Attorney General Lisa Monaco said in a statement that the arrest was the “result of over two-and-a-half-years of investigation into the LockBit ransomware group.”
...

31441_800.jpg
 

Goldhedge

GIM2 Refugee
Moderator
Benefactor
Messages
6,130
Reaction score
5,795
Points
213
You'd think they would have hit one place, maybe two and called it good.

Pigs get fat, hogs get slaughtered.
 

Ensoniq

Fly on the Wall
Benefactor
GIM2 Refugee
Messages
82
Reaction score
156
Points
103
Location
North Carolina
I will say that share point has put an end to the ransomware risk once and for all in my opinion,

have been hit multiple times - never paid, just rebuilt. Sister company paid 1mm from insurance and they unlocked them.

was starting to restrict who,could send attachments, was blocking inbound emails from non company sources etc

now anyone can get themselves in a virus or ransomware situation and you just pull a backup from before they were hit and keep moving. Because everyone is isolated it’s doesn’t propagate as easy
 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213

Interpol’s seizes over $130m in virtual assets in operation HAECHI III​

The international police force closed a worldwide operation this week which covered over 1,600 cases.

By Claudia Glover
November 25, 2022

Interpol has seized $130m of virtual assets as part of an operation which concluded this week. Known as HAECHI III, it resolved 1,600 cases and saw the launch of a new anti-money laundering rapid response tool (ARRP) that enables countries to reclaim stolen money and digital assets.

Operation HAECHI III ran over a five-month period from June-November, targeting money and online currencies linked to cyber enabled financial crime and money laundering.

More:

 

Casey Jones

Train left the station...
Benefactor
GIM2 Refugee
Messages
664
Reaction score
783
Points
193
Location
Western Montana
So, what comes next? Asset forfeiture? More donations from Interpol to local crypto-Marxist political parties worldwide?

I no longer trust ANYTHING within Western governments. As we've seen, their political police are now enablers - for pedophile trafficking, child grooming, Depopulation, suppression of political opposition or of Rights movements by ordinary citizens.
 

CiscoKid

Pirate
Benefactor
Messages
983
Reaction score
1,331
Points
193
So, what comes next? Asset forfeiture? More donations from Interpol to local crypto-Marxist political parties worldwide?

I no longer trust ANYTHING within Western governments. As we've seen, their political police are now enablers - for pedophile trafficking, child grooming, Depopulation, suppression of political opposition or of Rights movements by ordinary citizens.


You got that right.
 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213
That was nice of them to apologize and give them a decryptor. And they even got rid of the peeps who attacked the hospital. Shows they do have some scruples.
 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213
 

pmbug

Your Host
Administrator
Messages
10,223
Reaction score
2,603
Points
268
Location
Texas
I seriously doubt that "the Hive" used a single point communication structure of a website (easily commandeered by authorities) to coordinate/operate. I could be wrong, but this seems more like window dressing than effective action.
 

Casey Jones

Train left the station...
Benefactor
GIM2 Refugee
Messages
664
Reaction score
783
Points
193
Location
Western Montana
I seriously doubt that "the Hive" used a single point communication structure of a website (easily commandeered by authorities) to coordinate/operate. I could be wrong, but this seems more like window dressing than effective action.
A fictional takedown.

Remember Fahrenheit 451? When the robotic salamander of the Fire Department, went out from burning a hidden library to pursue the perp. A vagrant was grabbed on the street and obliterated; and the Screens all announced that the dangerous radical was "apprehended."

Likewise, here. You don't believe the story, because it's illogical and too pat. But we're dealing with DUMMPFUX here...government bureaucrats, fat, dumb and happy; but pressured to show "results."
 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213
In February, attackers from the Russia-based BlackCat ransomware group hit a physician practice in Lackawanna County, Pennsylvania, that's part of the Lehigh Valley Health Network (LVHN). At the time, LVHN said that the attack “involved” a patient photo system related to radiation oncology treatment. The health care group said that BlackCat had issued a ransom demand, “but LVHN refused to pay this criminal enterprise.”

After a couple of weeks, BlackCat threatened to publish data stolen from the system. “Our blog is followed by a lot of world media, the case will be widely publicized and will cause significant damage to your business,” BlackCat wrote on their dark-web extortion site. “Your time is running out. We are ready to unleash our full power on you!” The attackers then released three screenshots of cancer patients receiving radiation treatment and seven documents that included patient information.

 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213
A team of ransomware hackers have published proprietary inside data allegedly obtained the Dutch shipping intelligence agency Royal Dirkzwager, according to cybsersecurity trade press. The leak purportedly include employee passports, contracts and other sensitive information. The hackers claim to have more data that is yet to be released, reports Security Week.

 

searcher

Praying Mantis
Moderator
Benefactor
Messages
2,504
Reaction score
900
Points
213

Linus Tech Tips channel hacked by crypto currency hackers​

Mar 23, 2023


Sad to see that hackers have erased and destroyed the work of a popular tech YouTuber 4:47
 
Top Bottom