AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Digimaus | All | Hackers caught |
November 29, 2023 2:30 PM * |
|||
From: https://tinyurl.com/3muv2d3v (theregister.com) === Europol shutters ransomware operation with kingpin arrests A few low-level stragglers remain on the loose, but biggest fish have been hooked Connor Jones Tue 28 Nov 2023 // 13:45 UTC International law enforcement investigators have made a number of high-profile arrests after tracking a major cybercrime group for more than four years. A joint investigation team (JIT), spearheaded by French authorities, formed in 2019 to bring down a ransomware group linked to major attacks across the world. Announcing the news today, Europol said that five individuals were arrested, including the 32-year-old leader of the group and four of its "most active accomplices." Thirty properties in Ukraine were raided on November 21 across the Kyiv, Cherkasy, Rivne, and Vinnytsia regions. A virtual command post was also established in Europol's Netherlands headquarters where data taken from the property raids was analyzed "immediately." Ukrainian National Police raid properties in search for the cybercriminals. Image courtesy of Europol. Ukrainian National Police raid properties in search of the cybercriminals. Image courtesy of Europol Europol said today in a press release that the arrests led to the "dismantlement" of the group. However, a spokesperson told The Register that "there are still a few members which are being sought after, but they're of lesser importance." The arrests follow 12 that were made in 2021, two years after the JIT was first assembled. Members of the same group were arrested in Ukraine and Switzerland, and key electronic devices were seized for forensic analysis, along with $52,000 in cash and five luxury vehicles. The seizure of the electronic devices and their subsequent analysis led to the identification of the key members arrested last week. Europol said "a number of operational sprints [had] been organized," heavily involving the Norwegian authorities over the past two years to analyze the devices. Asked why the arrests have come so long after the initial seizure, a spokesperson told The Register that it takes time to gather enough evidence to prosecute cybercriminals. "As always with investigations as well, there's a strategy to try, we might have identified these members, but we were continuing to build the picture," they said. "Whenever you do all the forensic work, you uncover other leads, but open up the investigation that feeds into other existing investigations. That's why we were only able to do the second round of actions now." Also contributing to the two-year delay was the war in Ukraine starting in 2022, shortly after the seizures were made. Europol believes this didn't slow investigations down at all, but the operation had to be reorganized. Who's been cuffed? The names of those arrested have not been released and the ransomware group itself doesn't behave like LockBit, AlphV/BlackCat or Rhysida. The cybercriminals were well-resourced and used multiple different strains to attack their targets. These included LockerGoga, MegaCortex, Hive, and Dharma. Europol said the group had attacked more than 250 servers belonging to organizations in 71 countries, netting the group hundreds of millions of euros in the process. The group isn't tracked with a moniker, as many repeat offenders are, but it is responsible for major historical attacks, perhaps most notably the ransomware incident at Norsk Hydro. It was also responsible for the attack on French consultancy Altran, which is now known as Capgemini Engineering following a 2019 acquisition. The spokesperson said the arrested cybercriminals were not core members of any of the organizations behind the ransomware strains they used. However, they were on the radar of law enforcement for their involvement in numerous other incidents under separate investigations. Members all had different roles within the group. Some were responsible for the actual intrusion into victims' systems, while others specialized in areas such as money laundering - a branch of ransomware operations that's also under close examination by global authorities. "Those responsible for breaking into networks did so through techniques including brute force attacks, SQL injections, and sending phishing emails with malicious attachments in order to steal usernames and passwords," Europol said. "Once inside the networks, the attackers remained undetected and gained additional access using tools including TrickBot malware, Cobalt Strike, and PowerShell Empire, in order to compromise as many systems as possible before triggering ransomware attacks." (R) === -- Sean ... Eyes hurt from excess screen time? There's a nap for that. --- MultiMail/Win v0.52 * Origin: Outpost BBS * Johnson City, TN (618:618/1) |
||||||
|
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
Execution Time: 0.015 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |