Ukrainian regulation enforcers have arrested a suspected botnet herder dependable for controlling an automated network of all-around 100,000 compromised devices to launch DDoS and other attacks.
The Security Services of Ukraine (SSU) claimed the resident of Ivano-Frankivsk also utilised the botnet to launch spam strategies, scan for vulnerabilities in sites to exploit, and brute-power users’ email passwords.
He’s reported to have uncovered and communicated with consumers for his solutions on encrypted channels like Telegram and shut underground forums, and been given the payment by way of platforms banned in Ukraine like WebMoney.
The National Security and Defence Council of Ukraine imposed sanctions on the Russian firm back in 2018.
However for the specific, he registered his genuine tackle with WebMoney, enabling SSU officers to find him rather conveniently.
He now faces costs beneath Part 2 of Posting 361-1 of the Criminal Code of Ukraine, which relates to the generation, distribution, or sale of destructive software package or components and interference with the get the job done of pcs, automatic methods, and personal computer or telecoms networks.
Police are now seeking by the devices seized at the residence to find out extra.
Ukrainian regulation enforcers have had a busy time in excess of new several years, as the state proceeds to harbor additional than its honest share of threat actors.
In February last yr, police arrested suspected associates of the Egregor ransomware group. A couple of months later on, in June, six suspected associates of the infamous Clop ransomware gang were being cuffed in Ukraine.
Then in Oct, two “prolific ransomware operators” were arrested in the place just after an international regulation enforcement operation.
Those people arrests appear in stark contrast to legislation enforcement exercise in Russia, wherever the state seems to give its blessing to cybercrime activity as extensive as it is targeted at victims outdoors the place.
Some areas of this posting are sourced from: