By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: US and UK authorities have imposed sanctions against individuals associated with Conti and Trickbot malware
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > US and UK authorities have imposed sanctions against individuals associated with Conti and Trickbot malware
News

US and UK authorities have imposed sanctions against individuals associated with Conti and Trickbot malware

Last updated: 2023/02/12 at 9:10 AM
Security Parrot Editorial Team Published February 12, 2023
Share
U.S. authorities are investigating a vast hacking-for-hire operation that involves attempts to pilfer confidential communications from investigative journalists, short sellers and advocacy groups fighting climate change. (Igor Stevanovic/Dreamstime/TNS)
SHARE

US and UK authorities have sanctioned seven Russians who are believed to be involved in the activities of the TrickBot hack group, whose malware was used to support the Conti and Ryuk ransomware attacks.

Let me remind you that the TrickBot hack group (aka ITG23, Gold Blackburn and Wizard Spider) is considered to be a financially motivated group, which is known mainly due to the development of the TrickBot banking Trojan of the same name.

Over the years, TrickBot has evolved from a classic banker designed to steal funds from bank accounts to a multifunctional dropper that spreads other threats (from miners and ransomware to infostealers). Last year, TrickBot was completely taken over by Conti malware operators, who used the group’s malware to support their own ransomware attacks.

The US and UK authorities have now announced that the countries are imposing sanctions on seven people they believe were involved in TrickBot malware distribution operations.

“Today, the United States, in conjunction with the UK, is designating seven individuals who are part of the Russia-based cybercriminal group Trickbot,” the US Treasury Department said in a statement.

The British authorities, in turn, write that “the attackers are responsible for 149 attacks on individuals and businesses in the UK, receiving ransoms of at least 27 million pounds.”

“104 victims of the Conti ransomware from the UK paid [the attackers] about £10 million, and 45 victims of the Ryuk ransomware paid about £17 million,” law enforcement officials calculated.

It is reported that the sanctions aimed at curbing “Russian cybercrime activity” and ransomware were the result of a partnership between the Office of Foreign Assets Control of the US Treasury, the UK Department of Foreign Affairs and International Development, the National Agency UK Crime Commission and the British Treasury.

The sanctions are imposed after a large-scale leak of internal chats and personal information of Conti and TrickBot members, which occurred as part of the so-called ContiLeaks and TrickLeaks incidents.

While Conti’s data breach was mostly focused on internal conversations and the hack group’s source code, Trickbot’s was even worse, with personal details, online accounts, and personal information about TrickBot members exposed on Twitter.

Ultimately, these “drains” led to the fact that Conti stopped its activities and broke up into several other groups.

The sanctions now imposed should result in the blocking of all property and funds belonging to the following individuals in the US and UK. Also, individuals and companies are now prohibited from making transactions with these individuals, including the payment of ransoms.

Vitaly Kovalev is considered one of the leaders of Trickbot. Known online under the nicknames Bentley and Ben. The U.S. District Court for the District of New Jersey released an indictment accusing Kovalev of conspiracy to commit bank fraud and bank fraud. This is due to a series of bank account hacks at various US financial institutions that took place in 2009 and 2010, before Dyre or Trickbot.

considered one of the leaders of Trickbot. Known online under the nicknames Bentley and Ben. The U.S. District Court for the District of New Jersey released an indictment accusing Kovalev of conspiracy to commit bank fraud and bank fraud. This is due to a series of bank account hacks at various US financial institutions that took place in 2009 and 2010, before Dyre or Trickbot. Maxim Mikhailov was allegedly involved in development at Trickbot. Known online as Baget.

allegedly did development work at Trickbot. Known online as Baget. Valentin Karyagin, according to the authorities, participated in the development of ransomware and other other malicious projects. The network is known under the nickname Globus.

according to the authorities, participated in the development of ransomware and other malicious projects. The network is known under the nickname Globus. Mikhail Iskritsky allegedly worked for Trickbot on money laundering and fraud projects. The network is known under the nickname Tropa.

allegedly worked for Trickbot on money laundering and fraud projects. The network is known under the nickname Tropa. Dmitry Pleshevsky allegedly worked on injecting malicious code into websites to steal victims’ credentials. Known online as Iseldor.

allegedly worked to inject malicious code into websites to steal victims’ credentials. Known online as Iseldor. Ivan Vakhromeev is considered the manager of the Trickbot group. Known online as Mushroom.

is considered the manager of the Trickbot faction. Known online as Mushroom. Valery Sedletsky was allegedly an administrator at Trickbot, including managing servers. The network is known under the nickname Strix.

The cybersecurity researchers believe that after the “shut down” of Conti, these people probably moved to other hack groups, that is, the sanctions imposed may make it much more difficult to pay ransoms to other extortionists who were previously associated with Conti. This list includes BlackCat, Royal Group, AvosLocker, Karakurt, LockBit, Silent Ransom and DagonLocker.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team February 12, 2023
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?