Malware & RansomwareHIGH

Malware - Russian National Convicted for Botnet Attacks

SASecurity Affairs
Ilya AngelovTA551BitPaymerransomwarebotnet
🎯

Basically, a Russian hacker was sentenced for using a network of infected computers to steal money from U.S. companies.

Quick Summary

A Russian hacker was sentenced for running a botnet that attacked U.S. firms. His actions resulted in over $14 million in extortion payments. This case highlights the serious risks of cybercrime.

What Happened

Ilya Angelov, a 40-year-old Russian national, was sentenced to 24 months in prison for operating a botnet involved in ransomware attacks against U.S. companies. Alongside his prison term, he was fined $100,000 and ordered to pay $1.6 million in restitution. The U.S. Department of Justice and the FBI’s Detroit Field Division announced the case, highlighting the serious implications of cybercrime on American businesses.

Angelov co-managed a cybercrime group known as TA551, also referred to as Mario Kart. This group operated between 2017 and 2021, spreading malware through spam emails. They sold access to infected computers to other criminals, enabling them to conduct ransomware attacks that locked victims out of their systems, demanding payments in cryptocurrency to regain access.

Who's Being Targeted

The FBI identified over 70 U.S. corporations that fell victim to ransomware attacks linked to Angelov’s operations. These attacks resulted in more than $14 million in extortion payments. The group’s strategy involved reselling access to compromised systems, making it a lucrative business model for cybercriminals.

Among the notable victims, the BitPaymer ransomware group utilized Angelov’s botnet to infect 72 U.S. companies between 2018 and 2019, generating significant revenue from extortion. This highlights the widespread impact of such cybercriminal networks on the U.S. economy and individual businesses.

Signs of Infection

Organizations targeted by Angelov’s group often experienced sudden system lockouts and demands for cryptocurrency payments. These ransomware attacks typically began with malicious email attachments that, when opened, would deploy the malware. Companies should be vigilant for unusual activity, such as inaccessible files or ransom notes demanding payment.

To protect against such threats, businesses must implement robust cybersecurity measures, including employee training on recognizing phishing attempts and maintaining updated security software. Regular backups of critical data can also mitigate the effects of a ransomware attack.

How to Protect Yourself

To safeguard against ransomware and botnet attacks, companies should adopt a multi-layered security approach. This includes:

  • Regularly updating software: Ensure all systems are up-to-date with the latest security patches.
  • Implementing strong email filters: Use advanced spam filters to block malicious emails before they reach inboxes.
  • Conducting employee training: Educate staff on recognizing phishing attempts and suspicious attachments.

Additionally, companies should invest in cybersecurity insurance to mitigate financial losses from potential attacks. The conviction of Ilya Angelov serves as a reminder of the ongoing threat posed by cybercriminals and the importance of proactive security measures.

🔒 Pro insight: This conviction underscores the FBI's commitment to dismantling cybercrime networks, signaling a potential increase in scrutiny on similar groups globally.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

HIGHMalware & Ransomware

RedLine Infostealer - Alleged Conspirator Extradited to US

An Armenian man has been extradited to the US for his role in the RedLine infostealer malware. This notorious software has stolen billions of credentials, affecting countless users. His extradition is a significant move in the fight against cybercrime, emphasizing the need for vigilance.

CyberScoop·
HIGHMalware & Ransomware

Ransomware - US Healthcare Provider Hit by Iranian Gang

A U.S. healthcare provider has been targeted by the Iranian ransomware gang Pay2Key. This attack underscores the growing risk to critical infrastructure. Organizations must enhance their cybersecurity measures to combat such threats.

SC Media·
HIGHMalware & Ransomware

Malware - Open Directory Campaign Uses Obfuscated VBS Files

A new malware campaign is using obfuscated VBS files and PNG loaders to deploy RATs. Organizations are at risk as this sophisticated attack reveals a complex multi-stage operation. Immediate protective measures are crucial to safeguard systems from these threats.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Trojanized ConnectWise ScreenConnect Attack Uncovered

A new tax-themed malvertising campaign is spreading trojanized ConnectWise ScreenConnect installers. Unsuspecting users searching for tax documents are at risk. Stay vigilant and protect your devices from these sophisticated attacks.

SC Media·
HIGHMalware & Ransomware

Malware - Illicit npm Packages Spread Covert Infections

Illicit npm packages are using fake install logs to spread malware. Developers are at risk of losing sensitive data and cryptocurrency. Stay vigilant and verify package sources!

SC Media·
HIGHMalware & Ransomware

Malware - Student Arrested in ClayRat Spyware Scheme

A student has been arrested for running the ClayRat spyware operation targeting Android users. This malware's rapid growth and collapse reveal significant security flaws. Stay informed to protect your devices from similar threats.

SC Media·