Tag Archives: criminal

Arrested Belarusian identified as significant cyber-criminal figure

Cybercrime threat landscape evolving rapidly

The suspect whom international authorities arrested in Belarus during a 29 November operation to dismantle the Andromeda botnet has been identified with a high degree of certainty as Jarets Sergey Grigorevich – aka Ar3s, a high-profile cyber-criminal and malware expert.

According to a 5 November blog post from Recorded Future’s Insikt Group, whose researchers made the identification, Ar3s, 33, is the mastermind of the botnet, and “one of the oldest and more highly respected members of the criminal underground.”

Also known as Apec (in Russian), Ch1t3r, and Sergey Jaretz or Sergey Jarets, Grigorevich’s dealings in the Russian-speaking underground date back to at least 2014, the post continues. “Ar3s is recognised as a leading expert in malware development and reverse engineering, network security, and antivirus technology,” writes company blog post authors Andrei Barysevich, director of advanced collection, and Alexandr Solad, intelligence analyst.

In addition to developing Andromeda, Ar3s also created the brute-forcing tool Windows SMTP Bruter v.1.2.3, and also

Read more at: https://www.scmagazineuk.com/news/arrested-belarusian-identified-as-significant-cyber-criminal-figure/article/712143/

Arrested Belarusian identified as significant cyber-criminal figure

Cybercrime threat landscape evolving rapidly

The suspect whom international authorities arrested in Belarus during a 29 November operation to dismantle the Andromeda botnet has been identified with a high degree of certainty as Jarets Sergey Grigorevich – aka Ar3s, a high-profile cyber-criminal and malware expert.

According to a 5 November blog post from Recorded Future’s Insikt Group, whose researchers made the identification, Ar3s, 33, is the mastermind of the botnet, and “one of the oldest and more highly respected members of the criminal underground.”

Also known as Apec (in Russian), Ch1t3r, and Sergey Jaretz or Sergey Jarets, Grigorevich’s dealings in the Russian-speaking underground date back to at least 2014, the post continues. “Ar3s is recognised as a leading expert in malware development and reverse engineering, network security, and antivirus technology,” writes company blog post authors Andrei Barysevich, director of advanced collection, and Alexandr Solad, intelligence analyst.

In addition to developing Andromeda, Ar3s also created the brute-forcing tool Windows SMTP Bruter v.1.2.3, and also

Read more at: https://www.scmagazineuk.com/news/arrested-belarusian-identified-as-significant-cyber-criminal-figure/article/712143/

Lines blurring between state-sponsored and criminal cyber attacks

How is malware getting in?

Across the IR cases handled by the CrowdStrike team, the most prevalent ways attackers first gained a foothold in a target environment was web server, web application, web shell exploits or file uploaders (37%), remote access (23%), supply chain compromise (12%), social engineering such as phishing (11%), cloud-based service exploits and attacks against externally accessible email portals or other unauthorised access (11%), and reconnaissance only or other (6%).

Malware-free attacks made up the majority of attacks (66%). CrowdStrike defines malware-free attacks as those where the initial tactic did not result in a file or file fragment being written to disk. Examples include attacks where code executes from memory or where stolen credentials are used for remote logins.

Attackers can also exploit inherent weaknesses in the client IT infrastructure, which present intrusion opportunities for attackers who do not want to leave traces of their

Read more at: http://www.computerweekly.com/news/450431380/Lines-blurring-between-state-sponsored-and-criminal-cyber-attacks

Arrested Belarussian identified as significant cyber-criminal figure

Cybercrime threat landscape evolving rapidly

The suspect whom international authorities arrested in Belarus during a 29 November operation to dismantle the Andromeda botnet has been identified with a high degree of certainty as Jarets Sergey Grigorevich – aka Ar3s, a high-profile cyber-criminal and malware expert.

According to a 5 November blog post from Recorded Future’s Insikt Group, whose researchers made the identification, Ar3s, 33, is the mastermind of the botnet, and “one of the oldest and more highly respected members of the criminal underground.”

Also known as Apec (in Russian), Ch1t3r, and Sergey Jaretz or Sergey Jarets, Grigorevich’s dealings in the Russian-speaking underground date back to at least 2014, the post continues. “Ar3s is recognised as a leading expert in malware development and reverse engineering, network security, and antivirus technology,” writes company blog post authors Andrei Barysevich, director of advanced collection, and Alexandr Solad, intelligence analyst.

In addition to developing Andromeda, Ar3s also created the brute-forcing tool Windows SMTP Bruter v.1.2.3, and also

Read more at: https://www.scmagazineuk.com/news/arrested-belarussian-identified-as-significant-cyber-criminal-figure/article/712143/

Russian cyber-criminal targeting European businesses jailed

Jail sentences handed out for hacking and phishing

A Russian hacker who ran a sophisticated computer hacking network that stole over £2 million from UK businesses has been jailed for nine years.


Vugar Mollachiev, 37, from Enfield, North London was sentenced at Southwark Crown Court for conspiracy to defraud and money laundering by using technical knowledge to infect computers.


Evidence from a previous cyber-crime investigation identified Mollachiev as being heavily involved in cyber-criminality and online fraud. Scotland Yard said Mollachiev and his friends used their technical knowledge to hack businesses across the UK and Europe. The funds were then spent on high-value goods or transferred to ‘mule’ accounts and ‘cashed out’ via machines before being transferred back to Russia from where they could not be recovered.


Police said Mollachiev was arrested by officers from the Met’s Falcon Cyber Crime Unit on March 17, however he was

Read more at: https://www.scmagazineuk.com/news/russian-cyber-criminal-targeting-european-businesses-jailed/article/711432/

Nine years jail for Russian cyber-criminal targeting European businesses

Jail sentences handed out for hacking and phishing

A Russian hacker who ran a sophisticated computer hacking network that stole over £2 million from UK businesses has been jailed for nine years.

Vugar Mollachiev, 37, from Enfield, North London was sentenced at Southwark Crown Court for conspiracy to defraud and money laundering by using technical knowledge to infect computers.

Evidence from a previous cyber-crime investigation identified Mollachiev as being heavily involved in cyber-criminality and online fraud. Scotland Yard said Mollachiev and his friends used their technical knowledge to hack businesses across the UK and Europe. The funds were then spent on high-value goods or transferred to ‘mule’ accounts and ‘cashed out’ via ATM machines before being transferred back to Russia from where they could not be recovered.

Police said Mollachiev was arrested by officers from the Met’s Falcon Cyber Crime Unit on 17 March, however he was not sentenced

Read more at: https://www.scmagazineuk.com/news/nine-years-jail-for-russian-cyber-criminal-targeting-european-businesses/article/711432/

Nine years jail for Russian cyber-criminal targeting European …

Jail sentences handed out for hacking and phishing

A Russian hacker who ran a sophisticated computer hacking network that stole over £2 million from UK businesses has been jailed for nine years.


Vugar Mollachiev, 37, from Enfield, North London was sentenced at Southwark Crown Court for conspiracy to defraud and money laundering by using technical knowledge to infect computers.


Evidence from a previous cyber-crime investigation identified Mollachiev as being heavily involved in cyber-criminality and online fraud. Scotland Yard said Mollachiev and his friends used their technical knowledge to hack businesses across the UK and Europe. The funds were then spent on high-value goods or transferred to ‘mule’ accounts and ‘cashed out’ via machines before being transferred back to Russia from where they could not be recovered.


Police said Mollachiev was arrested by officers from the Met’s Falcon Cyber Crime Unit on March 17, however he was

Read more at: https://www.scmagazineuk.com/news/nine-years-jail-for-russian-cyber-criminal-targeting-european-businesses/article/711432/

Cyber Criminal Gets 14 Years For $50 Million Fraud

LAS VEGAS (KXNT) – A Russian cyber-criminal was sentenced Thursday to 14 years in prison for his role in a $50 million cyber fraud ring and for defrauding banks of $9 million through a hacking scheme.

Acting Assistant Attorney General John P. Cronan of the Justice Department’s Criminal Division, Acting U.S. Attorney Steven W. Myhre of the District of Nevada, U.S. Attorney Byung J. Pak of the Northern District of Georgia, Assistant Special Agent in Charge Michael Harris of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (ICE HSI), Special Agent in Charge Brian Spellacy of the U.S. Secret Service in Las Vegas, and FBI Special Agent in Charge David J. LeValley in Atlanta made the announcement.

Roman Valeryevich Seleznev, aka Track2, Bulba and Neux, 33, was sentenced by U.S. District Judge Steve C. Jones of the Northern District of Georgia to serve 168

Read more at: http://lasvegas.cbslocal.com/2017/11/30/cyber-criminal-gets-14-years-for-50-million-fraud/

Russian cyber criminal given additional jail time for role in $50M fraud ring

A Russian cyber criminal already serving a 27-year sentence in federal prison has been given an additional 14 years for his role in a $50 million scheme that involved trafficking stolen credit card numbers.

The Justice Department on Thursday sentenced Roman Seleznev, the son of a member of Russian parliament, to additional jail time for his role in the organized cybercrime ring and for defrauding banks of $9 million through a computer hacking scheme.

Seleznev has also been ordered to pay over $50 million in restitution, according to federal officials. 

Seleznev pleaded guilty in both criminal cases, which were investigated in Nevada and Georgia, in early September.

The 33-year-old Russian was previously convicted in federal court in Washington on 38 counts related to his role in a wire fraud and computer hacking scheme targeting U.S. businesses.

Federal officials say that Seleznev netted over $169 million in profits from hacking into point-of-sale computers, stealing

Read more at: http://thehill.com/policy/cybersecurity/362663-russian-cyber-criminal-given-additional-jail-time-for-role-in-50-million

Russian cyber criminal given additional jail time for role in $50M …

A Russian cyber criminal already serving a 27-year sentence in federal prison has been given an additional 14 years for his role in a $50 million scheme that involved trafficking stolen credit card numbers.

The Justice Department on Thursday sentenced Roman Seleznev, the son of a member of Russian parliament, to additional jail time for his role in the organized cybercrime ring and for defrauding banks of $9 million through a computer hacking scheme.

Seleznev has also been ordered to pay more than $50 million in restitution, according to federal officials. 

Seleznev pleaded guilty in both criminal cases, which were investigated in Nevada and Georgia, in early September.

The 33-year-old Russian was previously convicted in federal court in Washington on 38 counts related to his role in a wire fraud and computer hacking scheme targeting U.S. businesses.

Federal officials say that Seleznev netted more than $169 million in profits from hacking into point-of-sale computers, stealing

Read more at: http://thehill.com/policy/cybersecurity/362663-russian-cyber-criminal-given-additional-jail-time-for-role-in-50-million