• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russian trickbot mastermind gets 5 year prison sentence for cybercrime spree

Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree

You are here: Home / General Cyber Security News / Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree
January 26, 2024

40-calendar year-previous Russian countrywide Vladimir Dunaev has been sentenced to five yrs and 4 months in jail for his position in developing and distributing the TrickBot malware, the U.S. Office of Justice (DoJ) claimed.

The progress comes nearly two months soon after Dunaev pleaded guilty to committing computer system fraud and id theft and conspiracy to commit wire fraud and financial institution fraud.

“Hospitals, schools, and corporations had been among the hundreds of thousands of TrickBot victims who endured tens of hundreds of thousands of bucks in losses,” DoJ reported. “When lively, Trickbot malware, which acted as an initial intrusion vector into sufferer laptop or computer systems, was made use of to help different ransomware variants.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Originating as a banking trojan in 2016, TrickBot developed into a Swiss Military knife able of delivering more payloads, which include ransomware. Pursuing efforts to get down the botnet, it was absorbed into the Conti ransomware procedure in 2022.

Cybersecurity

The cybercrime crew’s allegiance to Russia through the Russo-Ukrainian war led to a collection of leaks dubbed ContiLeaks and TrickLeaks, which precipitated its shutdown in mid-2022, ensuing in its fragmentation into quite a few other ransomware and details extortion groups.

Dunaev is reported to have supplied specialized expert services and technological talents to even further the TrickBot plan involving June 2016 and June 2021, utilizing it to provide ransomware from hospitals, colleges, and companies.

Exclusively, the defendant made browser modifications and malicious applications that designed it achievable to harvest credentials and delicate facts from compromised machines as well as empower distant accessibility. He also produced packages to prevent the Trickbot malware from becoming detected by authentic security program.

Yet another TrickBot developer, a Latvian countrywide named Alla Witte, was sentenced to two a long time and eight months in jail in June 2023.

News of Dunaev’s sentencing comes days immediately after governments from Australia, the U.K., and the U.S. imposed money sanctions on Alexander Ermakov, a Russian national and an affiliate for the REvil ransomware gang, for orchestrating the 2022 attack against overall health insurance policies company Medibank.

Cybersecurity organization Intel 471 mentioned Ermakov went by various on-line aliases these kinds of as blade_runner, GustaveDore, JimJones, aiiis_ermak, GistaveDore, gustavedore, GustaveDore, Gustave7Dore, ProgerCC, SHTAZI, and shtaziIT.

Cybersecurity

As JimJones, he has also been observed trying to recruit unethical penetration testers who would provide login credentials for vulnerable corporations for adhere to-on ransomware attacks in trade for $500 per obtain and a 5% slice of the ransom proceeds.

“These identifiers are joined to a wide variety of cybercriminal activity, which includes network intrusions, malware progress, and ransomware attacks,” the firm mentioned, presenting insights into his cybercrime background.

“Ermakov had a strong existence on cybercriminal discussion boards and an lively function in the cybercrime-as-a-provider overall economy, equally as a customer and company and also as a ransomware operator and affiliate. It also appears that Ermakov was concerned with a software package development company that specialised in equally genuine and criminal program advancement.”

Identified this article exciting? Follow us on Twitter  and LinkedIn to browse extra unique information we put up.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «critical cisco flaw lets hackers remotely take over unified comms Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems
Next Post: Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs microsoft warns of widening apt29 espionage attacks targeting global orgs»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.