The U.S. authorities on Tuesday introduced as much as $10 million in rewards for info on six hackers related to the Russian army intelligence service.
“These individuals participated in malicious cyber activities on behalf of the Russian government against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act,” the State Department’s Rewards for Justice Program mentioned.
All the six Russian officers are members of a sophisticated persistent menace group known as Sandworm (aka Voodoo Bear or Iron Viking), which is thought to be working since not less than 2008 with a selected deal with concentrating on entities in Ukraine with the aim of creating a bootleg, long-term presence in an effort to mine extremely delicate data.
The hacker, who’re officers of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU), are as follows –
- Artem Valeryevich Ochichenko, who has been linked to technical reconnaissance and spear-phishing campaigns to realize unauthorized entry to IT networks of crucial infrastructure services worldwide
- Anatoliy Sergeyevich Kovalev, who’s accused of creating spear-phishing strategies and messages utilized by the Russian authorities to breach pc techniques of crucial infrastructure services
On October 15, 2020, the U.S. Justice Department indicted the aforementioned officers for finishing up damaging malware assaults with an purpose to disrupt and destabilize different nations and trigger financial losses, charging them with conspiracy to commit wire fraud and aggravated identity theft.
As a part of the initiative, the Rewards of Justice has arrange a Tor web site at “he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad[.]onion” that can be utilized to submit recommendations on these menace actors anonymously, or alternatively share the knowledge through Signal, Telegram, or WhatsApp.
The Sandworm collective was most not too long ago attributed to a now-neutralized refined botnet malware dubbed Cyclops Blink that ensnared internet-connected firewall gadgets and routers from WatchGuard and ASUS.
Other current hacking actions related to the group embrace the deployment of an upgraded model of the Industroyer malware in opposition to high-voltage electrical substations in Ukraine amidst the continuing invasion.