Friend
Professional
- Messages
- 2,659
- Reaction score
- 864
- Points
- 113
In Spain, Maxim Silnikov was arrested and extradited to the United States, who is accused of creating a Ransom Cartel ransomware distribution campaign and organizing a large-scale malicious advertising scheme that operated from 2013 to 2022.
Maxim Silnikov, 38, who goes by the pseudonyms "J. P. Morgan", "xxx" and "lansky" on hacker forums, has attracted the attention of intelligence agencies for his involvement in major cyber attacks. According to the UK intelligence services, Silnikov and his accomplices are elite cybercriminals who used strict measures to ensure their own security on the network in order to avoid capture.
In the latest case, Silnikov is accused of creating and managing the Ransomware-as-a-Service (RaaS) scheme, which was actively used to attack companies and individuals. Silnikov's important role was played by negotiating with Initial Access Brokers (IAB), which provided access to compromised corporate networks, as well as managing communications with victims and processing ransoms. Silnikov was involved in laundering money from ransoms through cryptocurrency mixers to hide traces of financial transactions and complicate the work of law enforcement agencies.
In addition, Silnikov was responsible for creating Reveton, a Trojan that blocked access to Windows and demanded a ransom for unlocking it. The malware posed as a tool of law enforcement agencies. The Trojan blocked the computer under the pretext of detecting child pornography and copyrighted materials. From its launch in 2011 to 2014, Reveton brought in about $400,000 a day to various cybercriminals.
Silnikov's malvertising activities (from October 2013 to March 2022) also proved to be large-scale and disruptive. Silnikov's task was to develop and distribute malicious ads that seemed harmless, but in fact redirected users to sites with viruses and malware.
The following tools were used in the malvertising campaign::
* Angler Exploit Kit (AEK): designed to exploit vulnerabilities in web browsers and plug-ins installed in them in order to deliver additional payloads to compromised devices.
* Locker malware: a "lightweight" ransomware program that prevents the victim from accessing their data, often requiring a fee to restore access.
* Scareware: They send fake alerts to the victim's computer, prompting the user to download malware or provide personal information to cybercriminals.
At its peak, the Angler Exploit Kit accounted for 40% of all exploit infections in the world and brought criminals about $34 million a year. More than 500 million users worldwide became victims of the attacks.
Silnikov also participated in the development and maintenance of a technical infrastructure, a traffic distribution system (TDS), to better manage and detect malicious campaigns.
During the international operation, NCA employees, together with colleagues from Ukraine, Portugal and Singapore, conducted searches, seized more than 50 terabytes of data and installed the infrastructure used to manage ransomware. The collected data will be used for further investigations and prosecution of other members of the criminal group.
Maxim Silnikov faces a sentence for fraud, computer crimes, identity theft and other crimes. If convicted on all charges, Silnikov could face up to 100 years in prison, although the actual sentence is likely to be shorter due to the possibility of serving multiple sentences at the same time.
Operation Ransom Cartel, launched in December 2021, shares many similarities with the REvil grouping code. Palo Alto Networks specialists reported a suspicious connection between Ransom Cartel and REvil. According to the study, Ransom Cartel started its operations just 2 months after the collapse of REvil. Then experts noted that Ransom Cartel operators have access to the source code of the REvil cryptographer, but they do not have an obfuscation mechanism in their arsenal, which is used to encrypt strings and hide API calls.
In 2019, a member of the cybercrime group that distributed the Reveton ransomware was sentenced in the UK to 6 years in prison and a fine of $355,000. According to the investigation, the 25-year-old student has been associated with the notorious Lurk group for 6 years.
• Source: https://www.justice.gov/opa/media/1363391/dl?inline
• Source: https://www.justice.gov/opa/media/1363386/dl?inline
• Source: https://www.nationalcrimeagency.gov...fic-cybercrime-groups-arrested-and-extradited
a.k.a Maksym Silnikov
a.k.a "targa"
a.k.a "klm"
a.k.a "lansky"
a.k.a "xxx"
a.k.a 'J.P.MORGAN,"
----
In the United States, the first court hearing was held in the case of 38-year-old Maxim Silnikov, whom the British National Crime Agency calls "one of the most famous Russian-speaking cybercriminals in the world." He may spend the rest of his life in prison. But it is possible that it will be released in two years.
According to the prosecution, together with two accomplices, natives of Belarus and Russia, in 2011 Silnikov created the first-ever ransomware program Reveton. He sold it to criminals, who then used the product for its intended purpose. It is believed that with the help of Reveton in the period from 2012 to 2014, about $400 thousand was extorted from victims every month.
It is claimed that Silnikov was also behind the creation of a set of Angler exploits used to inject malicious code into online advertising. At the peak of its popularity, Angler accounted for about half of such virus infections. In total, about 100 thousand devices were affected, and the annual turnover of criminals was about $34 million.
Silnikov is also accused of creating the Ransom Cartel ransomware virus, which he used to demand a ransom from at least one California-based company.
In July, Silnikov was detained in Spain and extradited to Poland, from where he was sent to the United States in early August. Both of his accomplices were also brought to justice. All of them will definitely have to serve at least two years in prison. Also, the defendants face a total of up to 57 years in prison each under various articles. However, the final verdict has not yet been passed.
• Source: https://www.justice.gov/opa/pr/lead...are-schemes-extradited-poland-face-cybercrime
They were detained in Estepona.
This is 38-year-old Maxim Silnikov with the online pseudonyms JP Morgan, xxx and lansky. He was hunted for a long time: Silnikov was considered one of the most productive Russian-speaking hackers on the planet. He will now stand trial in the United States.
The report of the US Department of Justice also includes alleged accomplices of Silnikov: 38-year-old citizen of Belarus (also with a Ukrainian passport) Vladimir Kadyrov and 33-year-old Russian Andrey Tarasov.
MAKSIM SILNIKAU,
a.k.a “Maksym Silnikov,”
a.k.a “Maksim Silnikov,”
a.k.a “Maxsim Andreyevich Silnikov,”
a.k.a “Maksym Mykolaiets,”
ANDREI TARASOV, and
VOLODYMYR KADARIYA,
a.k.a “Volodymyr Kadaria,”
a.k.a “Vladimir Kadaria”
Maxim Silnikov, 38, who goes by the pseudonyms "J. P. Morgan", "xxx" and "lansky" on hacker forums, has attracted the attention of intelligence agencies for his involvement in major cyber attacks. According to the UK intelligence services, Silnikov and his accomplices are elite cybercriminals who used strict measures to ensure their own security on the network in order to avoid capture.
In the latest case, Silnikov is accused of creating and managing the Ransomware-as-a-Service (RaaS) scheme, which was actively used to attack companies and individuals. Silnikov's important role was played by negotiating with Initial Access Brokers (IAB), which provided access to compromised corporate networks, as well as managing communications with victims and processing ransoms. Silnikov was involved in laundering money from ransoms through cryptocurrency mixers to hide traces of financial transactions and complicate the work of law enforcement agencies.
In addition, Silnikov was responsible for creating Reveton, a Trojan that blocked access to Windows and demanded a ransom for unlocking it. The malware posed as a tool of law enforcement agencies. The Trojan blocked the computer under the pretext of detecting child pornography and copyrighted materials. From its launch in 2011 to 2014, Reveton brought in about $400,000 a day to various cybercriminals.
Silnikov's malvertising activities (from October 2013 to March 2022) also proved to be large-scale and disruptive. Silnikov's task was to develop and distribute malicious ads that seemed harmless, but in fact redirected users to sites with viruses and malware.
The following tools were used in the malvertising campaign::
* Angler Exploit Kit (AEK): designed to exploit vulnerabilities in web browsers and plug-ins installed in them in order to deliver additional payloads to compromised devices.
* Locker malware: a "lightweight" ransomware program that prevents the victim from accessing their data, often requiring a fee to restore access.
* Scareware: They send fake alerts to the victim's computer, prompting the user to download malware or provide personal information to cybercriminals.
At its peak, the Angler Exploit Kit accounted for 40% of all exploit infections in the world and brought criminals about $34 million a year. More than 500 million users worldwide became victims of the attacks.
Silnikov also participated in the development and maintenance of a technical infrastructure, a traffic distribution system (TDS), to better manage and detect malicious campaigns.
During the international operation, NCA employees, together with colleagues from Ukraine, Portugal and Singapore, conducted searches, seized more than 50 terabytes of data and installed the infrastructure used to manage ransomware. The collected data will be used for further investigations and prosecution of other members of the criminal group.
Maxim Silnikov faces a sentence for fraud, computer crimes, identity theft and other crimes. If convicted on all charges, Silnikov could face up to 100 years in prison, although the actual sentence is likely to be shorter due to the possibility of serving multiple sentences at the same time.
Operation Ransom Cartel, launched in December 2021, shares many similarities with the REvil grouping code. Palo Alto Networks specialists reported a suspicious connection between Ransom Cartel and REvil. According to the study, Ransom Cartel started its operations just 2 months after the collapse of REvil. Then experts noted that Ransom Cartel operators have access to the source code of the REvil cryptographer, but they do not have an obfuscation mechanism in their arsenal, which is used to encrypt strings and hide API calls.
In 2019, a member of the cybercrime group that distributed the Reveton ransomware was sentenced in the UK to 6 years in prison and a fine of $355,000. According to the investigation, the 25-year-old student has been associated with the notorious Lurk group for 6 years.
• Source: https://www.justice.gov/opa/media/1363391/dl?inline
• Source: https://www.justice.gov/opa/media/1363386/dl?inline
• Source: https://www.nationalcrimeagency.gov...fic-cybercrime-groups-arrested-and-extradited
a.k.a Maksym Silnikov
a.k.a "targa"
a.k.a "klm"
a.k.a "lansky"
a.k.a "xxx"
a.k.a 'J.P.MORGAN,"
----
In the United States, the first court hearing was held in the case of 38-year-old Maxim Silnikov, whom the British National Crime Agency calls "one of the most famous Russian-speaking cybercriminals in the world." He may spend the rest of his life in prison. But it is possible that it will be released in two years.
According to the prosecution, together with two accomplices, natives of Belarus and Russia, in 2011 Silnikov created the first-ever ransomware program Reveton. He sold it to criminals, who then used the product for its intended purpose. It is believed that with the help of Reveton in the period from 2012 to 2014, about $400 thousand was extorted from victims every month.
It is claimed that Silnikov was also behind the creation of a set of Angler exploits used to inject malicious code into online advertising. At the peak of its popularity, Angler accounted for about half of such virus infections. In total, about 100 thousand devices were affected, and the annual turnover of criminals was about $34 million.
Silnikov is also accused of creating the Ransom Cartel ransomware virus, which he used to demand a ransom from at least one California-based company.
In July, Silnikov was detained in Spain and extradited to Poland, from where he was sent to the United States in early August. Both of his accomplices were also brought to justice. All of them will definitely have to serve at least two years in prison. Also, the defendants face a total of up to 57 years in prison each under various articles. However, the final verdict has not yet been passed.
• Source: https://www.justice.gov/opa/pr/lead...are-schemes-extradited-poland-face-cybercrime
They were detained in Estepona.
This is 38-year-old Maxim Silnikov with the online pseudonyms JP Morgan, xxx and lansky. He was hunted for a long time: Silnikov was considered one of the most productive Russian-speaking hackers on the planet. He will now stand trial in the United States.
The report of the US Department of Justice also includes alleged accomplices of Silnikov: 38-year-old citizen of Belarus (also with a Ukrainian passport) Vladimir Kadyrov and 33-year-old Russian Andrey Tarasov.
MAKSIM SILNIKAU,
a.k.a “Maksym Silnikov,”
a.k.a “Maksim Silnikov,”
a.k.a “Maxsim Andreyevich Silnikov,”
a.k.a “Maksym Mykolaiets,”
ANDREI TARASOV, and
VOLODYMYR KADARIYA,
a.k.a “Volodymyr Kadaria,”
a.k.a “Vladimir Kadaria”