Ukraine Cyber Specialists from the Security Service of Ukraine performed a joint operation with the cyber police, American and British partner to eliminate a powerful group of hackers.
And they successfully detained five criminals that belong to a ransomware gang who were responsible for launching attacks on 50 companies that belong to the America and Europe. However, the ransomware gang they belong to has not been disclosed yet.
The arrests happened earlier this week with the lead hacker being a 36 year old Kyiv resident, his spouse and three other individuals. The arrests were justified by the groups illegal and malicious act on government and private bodies to encrypt and steal data, with ransomware and DDOS attacks.
As per the Ukrainian authorities statement, The entire act was administered from their personal devices, and to avoid illegal claims they impersonated with different names on the Darknet network. Adding to that they had connections and network to launder their money and profits to payment cards owned by fictitious individuals. After some analysis, the Ukrainian authorities claimed that the gang has made around one million from the attacks.
The authorities performed a thorough search on nine different locations were the raids were done with assistance from law enforcement agencies of the US and UK. Equipment seized includes laptops, desktops, mobile phones, credit/debit cards, flash drive and three cars.
Authorities from other countries are also ready to detain and investigate the criminals as the attacks were carried out overseas as well.
However, we need to appreciate the Ukrainian authorities for their continuous filtration and cyber warfare procedure that they have been taking since the beginning of 2021.
This is the fifth major ransomware arrest carried out by the Ukrainian Cyber Security team,
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
You can reach out to us via Twitter or Facebook, for any advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…