The United States announced a $10 million reward for the capture of a Russian hacker

Carding Forum

Professional
Messages
2,788
Reaction score
1,198
Points
113
US authorities have accused 22-year-old Russian citizen Amin Stigal of carrying out cyber attacks on computer networks of Ukraine and other countries for the purposes of the GRU.

According to the case file, in January 2022, Stigal distributed the WhisperGate pseudo-ransomware in the systems of dozens of Ukrainian state institutions. The attacker demanded a ransom of $10,000 in bitcoins, but the malware actually damaged all disk partitions beyond recovery. The Russian also resold stolen data on the darknet.

Since August 2022, Stigal and his accomplices have expanded the geography of attacks: they hacked into the country's transport infrastructure in Central Europe, attacked government agencies of the United States and other NATO member states.

The US State Department announced a reward of $10 million for information about the hacker's location. He faces up to five years in prison.

• Source: https://www.justice.gov/opa/pr/russ...ussia-military-intelligence-destroy-ukrainian

• Source: https://www.justice.gov/d9/2024-06/amin_stigal_unsealed_indictment_0.pdf

• Source: https://rewardsforjustice.net/rewards/amin-stigal/
 
On June 26, the state of Maryland reported that on the eve of the grand jury of the federal court in Greenbelt approved the charge brought in absentia against 22-year-old Russian Amin Timovich Stigal in an attempt to hack and destroy the computer systems of a number of government agencies of Ukraine and its allies, including the United States, or rather the United States and its allies, including Ukraine,"that's American. At the same time, just in case, the court issued a warrant for his arrest, for which the FBI offers up to $ 10 million for assistance.

"It is assumed," said our Attorney General, also known as Minister of Justice Merrick Garland, "that on the eve of the illegal and unprovoked invasion of Russia into Ukraine, the accused of colluding with Russian military intelligence" (GRU) tried to commit the above-mentioned atrocities, for which he now faces up to 5 years in prison. "The Justice Department will continue to support Ukraine on every front in its fight against Russian aggression, including holding accountable those who support malicious Russian cyber activity," Garland said.

In the same statement, Deputy Secretary of Homeland Security Matthew Olsen clarified that "the GRU has repeatedly implemented a Russian state policy of indiscriminate destruction and intimidation in cyberspace," and "the Department (of Justice) contributes to the prevention and suppression of such malicious behavior that relies on network services or infrastructure of the United States, or targets victims from outside the United States." US$. We will also identify, prosecute and eventually bring to justice those responsible for Russia's malicious actions, including cybercriminals that Russia cultivates to develop its malicious program." A little heavy, of course, said, but that 62-year-old Olsen and deputy 71-year-old Garland. Similar opinions were expressed by the deputy director of the FBI, Paul Abbate, the head of the bureau's Baltimore office, William DeBagno, and the federal prosecutor of Maryland, Eric Barron, As Abbate, who is also responsible for our state security, noted: "Amin Timovich Stigal used malware to help the Russian military invasion of Ukraine."

From the 8 pages of the indictment, it is clear that in January 2022, 20-year-old Stigal and "employees of the Main Intelligence Directorate of the General Staff (GRU) of the Russian Federation", who are held in case No. 8: 24-cr 00206, as " Conspirators "(the Conspirators), "conspired to use the servers of the American Intelligence Service". companies to spread malware, known in the cybersecurity community as "Whisper-Gate", on dozens of computer systems of Ukrainian government agencies and destroy these systems, as well as related data, before the Russian invasion of Ukraine."

About the program "WhisperGate" it is known that this is malicious software (software) that operates on the model of ransomware viruses (ransomware), but unlike them, it does not block, but deletes data from servers. Experts called "WhisperGate" similar to the NotPetya virus, with which the GRU conducted attacks on the infrastructure of Ukraine, the United States and European countries in 2017.

On January 13, 2022, this conspiracy was activated, and the Ukrainian Ministries of Foreign Affairs, Emergency Situations, Finance, Education and Science, Energy, as well as the Accounts Chamber, the Forestry Department, the Automobile Insurance Bureau, the public services portal and other state institutions were under cyber attacks. Part of the data stolen during the attack, in particular medical data, was put up for sale by Stigal and his accomplices (not the GRU) on hacker forums in January 2022. According to the prosecution, the "Conspirators" damaged several targeted computer systems in Ukraine, destroying and stealing important data contained there, instead of which the inscription appeared on the monitors: "Ukrainians! All information about you has become public, so be afraid and expect the worst. This is for your past, present and future." On the same day, the "Conspirators" put the hacked data up for sale on the Internet.

According to the prosecution, the purpose of the attack was "to sow concern among the population of Ukraine about the security of state systems and data." Already after the Russian invasion, in August 2022, the "Conspirators", that is, Amin Stigal and the GRU, hacked the transport infrastructure of an unspecified"Central European country that supported Ukraine" with a similar cyberattack. The prosecution also alleges that from August 5, 2021, to February 3, 2022, "Conspirators" invaded the computers of an unspecified federal agency in Maryland. The indictment also alleges that from August 5, 2021, to February 3, 2022, the conspirators used the same computer infrastructure they used in the Ukraine - related attacks to inspect computers belonging to a federal government agency in Maryland, in the same way that they initially investigated Ukrainian government networks.

As already mentioned, Amin Timovich Stigal faces up to 5 years in prison for this, if, of course, he is detained, brought from the United States, convicted and sentenced. It is known about him that Amin was born in Grozny, Chechnya, in 2002, then lived and studied at a school in Saratov, Russia, and at the age of 20 changed his passport in Dagestan, where his father lives. Being a "millennial", that is, a product of the new millennium, he became interested in the Internet from a young age, spent his leisure time on the sites of hackers and carders, and on the Telegram communication site used the "nickname", that is, the nickname-password "Zabuza Momochi", a character from the Japanese multi-series "Naruto", an aggressive and ambitious boy who I'm only interested in money. Other" nicknames "of the young Stigal were Free Civil and Vaticano, and it was under this "nickname" that he put up the stolen Ukrainian data for sale in January 2022.

The apple of cybercrime in the person of Amin Timovich Stigal fell not far from the apple tree, his 46-year-old father Timur (Tim) Vakhaevich. In January of this year, the New Jersey Federal Prosecutor's Office also charged Stigal Sr. and Russian Alexey Timofeevich Stroganov, aka "Oleg Gursky and Flint," in absentia with cyber fraud. The 12 counts allege that between April 2014 and March 2016, Tim Steagall passed on stolen payment card information belonging to customers of at least three different US companies. According to the New Jersey prosecutor's office, Stroganov, Stigal and their associates collected data from hundreds of millions of credit cards and bank accounts, which they then sold, causing $35 million in damages to various financial institutions. Timur Stigal was born in the Chechen village of Kurchaloy, lives in Dagestan and Moscow, and is still interested in cyber fraud. In some leaked media databases of the Russian Ministry of Internal Affairs, his name is marked that he is suspected of terrorism and extremism. In Russia, he is not accused of anything, and in the United States, like his son, he faces up to 5 years in prison, and although the FBI also put him on the wanted list, they do not offer such money as for Amin for helping him arrest.

With Alexey Stroganov, everything is more complicated. Now he and 25 accomplices are being tried for carding in Moscow, where he faces from 12 to 20 years in prison, and the New Jersey prosecutor's office accused him in absentia of fraud using electronic means and conspiracy, for which you can also get up to 20 years. Stroganov was already tried for carding in 2006 and sentenced to 6 years in a penal colony. According to the FSB, Stroganov's group produced 5,000 fake Visa, MasterCard, and American Express credit cards that were sold in Russia, Belarus, Ukraine, Poland, the Czech Republic, France, Germany, and the United States. After being released, he became an expert in the field of cybersecurity, providing paid services to protect against hacker attacks on banks and payment systems. In 2018, Stroganov was awarded the certificate of the FSB Director Bortnikov and received the gratitude of President Putin for ensuring cybersecurity during the World Cup.

At the same time, he created the non-profit organization Kibalchish, ostensibly to fight cybercrime. In fact, according to the prosecution, it was an organized criminal group or, as they now say, a community (OPS), in which Stroganov recruited more than 20 hackers from 2014 to 2020 and created a whole structure of portals on the darknet that sold stolen bank card data. In court, the prosecutor said that during a search at the address of one of the Kibalchish units, $ 432,000 was seized.
 
Accusations from the United States and Estonia

The United States has accused six Russians of cyberattacks against Ukraine in January 2022, as well as a number of other hacks. Among them is Amin Stigal, who was charged with the same acts in June. Five more are named as military intelligence officers.

The defendants are charged, among other things, with using the infrastructure of an American company (apparently, Discord) to distribute the WhisperGate malware, a wiper disguised as a ransomware, with the help of which the resources of some Ukrainian government agencies were disabled, as well as probing computers in Maryland (a court in this state is considering the case), etc.

The defendants charged in the indictment are: Yuriy Denisov [Yuri Denisov], a colonel in the Russian military and a commanding officer of Cyber Operations for Unit 29155; four lieutenants in the Russian military assigned to Unit 29155 who worked on cyber operations: Vladislav Borovkov [Vladislav Borovkov], Denis Denisenko [Denis Denisenko], Dmitriy Goloshubov [Dima Goloshubov] and Nikolay Korchagin [Nikolay Korchagin]; and a civilian co-conspirator, Amin Sitgal.

• Source: https://www.justice.gov/opa/media/1366441/dl
• Source: https://www.justice.gov/opa/pr/five...-charged-conspiring-hack-ukrainian-government

CISA and a dozen international partners have also published a technical report on the group's alleged activities since 2020.

• Source: https://www.reuters.com/technology/...l-saturday-caused-by-cyber-attack-2022-11-03/

A press release from the US Department of Justice notes that the charges are part of Operation Toy Soldier, which the United States conducted together with nine other countries. Thus, in addition to the United States, Estonia also made accusations against Russia. The Estonian Foreign Ministry officially attributed cyberattacks against the country in 2020 Russian military intelligence - and the Foreign Ministry separately stressed that this is the first case of official attribution from the Estonian side.

• Source: https://vm.ee/uudised/eesti-omistas...kuberrunnakud-kuriteo-toimepanijatele-kelleks
 
213af25e7c.png
 
477ce3b886.png


The Department of Justice has unveiled charges against GRU officers and a civilian from Russia in connection with a cyberattack on Ukrainian infrastructure in January 2022

The United States has indicted five Russian intelligence officers and one civilian from Russia in connection with a large-scale cyberattack in the run-up to Russia's full-scale invasion of Ukraine.

On Thursday, the US Department of Justice unveiled a new indictment accusing Russians of conducting a WhisperGate cyberattack in January 2022 aimed at weakening Ukraine's civilian infrastructure on the eve of the Russian invasion.

"The WhisperGate campaign included attacks on civilian infrastructure and computer systems completely unrelated to the military or national defense," said Assistant Attorney General Matthew Olsen.

According to him, as a result of the attack, in particular, government departments responsible for Ukrainian emergency services, the judicial system, food security and education were affected. The attack was designed to undermine the morale of Ukrainians, he added.

The attack "can be considered the first shot of the war," said FBI Special Agent Bill Delbango, who spoke with Olsen at a press conference in Baltimore.

According to Delbango, the WhisperGate campaign was also directed against the U.S. and dozens of NATO allies, with hackers managing to infiltrate a U.S. government agency in Maryland and gain access to U.S. bank accounts.

The indictment unsealed on Thursday is a new version of charges first brought in June against 22-year-old Russian Amin Stigal, a civilian accused of using malware to assist Russian intelligence before the invasion of Ukraine.

It is alleged that Stigal and agents from military unit 21955 of the Main Directorate of the General Staff of the Russian Armed Forces (also known as the GRU) used the cyber infrastructure of American companies for an operation that looked like a ransom attack, but was actually designed to delete critical data.

The updated indictment names Stigal's alleged accomplices from the GRU: Vladislav Borovkov, Denis Denisenko, Yuri Denisov, Dmitry Goloshubov and Nikolai Korchagin.

The United States announced a reward of up to $ 10 million for each of the named Russians.

"We are sending a clear signal to the GRU, to the Russian side: we are coming for you," Olsen said.

The Russian Embassy in Washington did not respond to VOA's request for comment.

A senior Ukrainian official praised the U.S. indictment and the multinational work that made it possible.

"This is a very vivid example of how cooperation, joint international work can really help in the fight against such a strong and, unfortunately, quite large enemy as Russia", said Ivan Kalabashkin, deputy head of the SBU cybersecurity department.

In his speech at a cybersecurity conference in Washington on Thursday, Kalabashkin said that Ukraine is subject to constant Russian cyberattacks, from 10 to 10about 15 major attacks a day, and warned that this threat is unlikely to decrease.

"The Russians are working hard to build up their offensive cyber capabilities", he said. "They teach students in universities, civilian universities, how to attack systems, how to attack infrastructure".

Source
 
Top