AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [1058 / 1576] RSS
 From   To   Subject   Date/Time 
Message   Digimaus    All   Hackers caught   November 29, 2023
 2:30 PM *  

From: https://tinyurl.com/3muv2d3v (theregister.com)

===
           Europol shutters ransomware operation with kingpin arrests

A few low-level stragglers remain on the loose, but biggest fish have
been hooked

   Connor Jones
   Tue 28 Nov 2023 // 13:45 UTC

   International law enforcement investigators have made a number of
   high-profile arrests after tracking a major cybercrime group for more than
   four years.

   A joint investigation team (JIT), spearheaded by French authorities,
   formed in 2019 to bring down a ransomware group linked to major attacks
   across the world.

   Announcing the news today, Europol said that five individuals were
   arrested, including the 32-year-old leader of the group and four of its
   "most active accomplices."

   Thirty properties in Ukraine were raided on November 21 across the Kyiv,
   Cherkasy, Rivne, and Vinnytsia regions. A virtual command post was also
   established in Europol's Netherlands headquarters where data taken from
   the property raids was analyzed "immediately."

   Ukrainian National Police raid properties in search for the
   cybercriminals. Image courtesy of Europol.

   Ukrainian National Police raid properties in search of the cybercriminals.
   Image courtesy of Europol

   Europol said today in a press release that the arrests led to the
   "dismantlement" of the group.

   However, a spokesperson told The Register that "there are still a few
   members which are being sought after, but they're of lesser importance."

   The arrests follow 12 that were made in 2021, two years after the JIT was
   first assembled. Members of the same group were arrested in Ukraine and
   Switzerland, and key electronic devices were seized for forensic analysis,
   along with $52,000 in cash and five luxury vehicles.

   The seizure of the electronic devices and their subsequent analysis led to
   the identification of the key members arrested last week.

   Europol said "a number of operational sprints [had] been organized,"
   heavily involving the Norwegian authorities over the past two years to
   analyze the devices.

   Asked why the arrests have come so long after the initial seizure, a
   spokesperson told The Register that it takes time to gather enough
   evidence to prosecute cybercriminals.

   "As always with investigations as well, there's a strategy to try, we
   might have identified these members, but we were continuing to build the
   picture," they said.

   "Whenever you do all the forensic work, you uncover other leads, but open
   up the investigation that feeds into other existing investigations. That's
   why we were only able to do the second round of actions now."

   Also contributing to the two-year delay was the war in Ukraine starting in
   2022, shortly after the seizures were made. Europol believes this didn't
   slow investigations down at all, but the operation had to be reorganized.

  Who's been cuffed?

   The names of those arrested have not been released and the ransomware
   group itself doesn't behave like LockBit, AlphV/BlackCat or Rhysida. The
   cybercriminals were well-resourced and used multiple different strains to
   attack their targets.

   These included LockerGoga, MegaCortex, Hive, and Dharma. Europol said the
   group had attacked more than 250 servers belonging to organizations in 71
   countries, netting the group hundreds of millions of euros in the process.

   The group isn't tracked with a moniker, as many repeat offenders are, but
   it is responsible for major historical attacks, perhaps most notably the
   ransomware incident at Norsk Hydro.

   It was also responsible for the attack on French consultancy Altran, which
   is now known as Capgemini Engineering following a 2019 acquisition.

   The spokesperson said the arrested cybercriminals were not core members of
   any of the organizations behind the ransomware strains they used. However,
   they were on the radar of law enforcement for their involvement in
   numerous other incidents under separate investigations.

   Members all had different roles within the group. Some were responsible
   for the actual intrusion into victims' systems, while others specialized
   in areas such as money laundering - a branch of ransomware operations
   that's also under close examination by global authorities.

   "Those responsible for breaking into networks did so through techniques
   including brute force attacks, SQL injections, and sending phishing emails
   with malicious attachments in order to steal usernames and passwords,"
   Europol said.

   "Once inside the networks, the attackers remained undetected and gained
   additional access using tools including TrickBot malware, Cobalt Strike,
   and PowerShell Empire, in order to compromise as many systems as possible
   before triggering ransomware attacks." (R)
===

-- Sean

... Eyes hurt from excess screen time?  There's a nap for that.
--- MultiMail/Win v0.52
 * Origin: Outpost BBS * Johnson City, TN (618:618/1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0184 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.220106