OP 30 September, 2024 - 12:53 AM
(This post was last modified: 30 September, 2024 - 12:54 AM by sehays. Edited 1 time in total.)
Federal authorities are offering a $10 million reward for information leading to the arrest of an accused Russian hacker who extorted millions of dollars from law enforcement agencies, hospitals, and schools in New Jersey and elsewhere.
Mikhail Matveyev, a Russian citizen born in 1992 and living in Kaliningrad, is accused of hacking 2,800 victims and demanding ransoms totaling at least $400 million, the Justice Department said.
According to two indictments unsealed by the Justice Department, Matveyev, a Russian citizen and resident, used three different ransomware variants to target U.S. residents.
Victims of the attacks paid about $200 million, according to the charges. The victims include law enforcement agencies in New Jersey and Washington, D.C., health care organizations, and schools across the state.
In June 2020, Matveyev targeted police in Passaic Park and last May, a mental health nonprofit in Mercer County. He also targeted the Metropolitan Police Department in Washington, D.C.
“Thanks to the outstanding investigative work of prosecutors in my office and our partners at the FBI, Matveyev is no longer hiding in the shadows,” said Philip Sellinger, U.S. Attorney for the District of New Jersey. “We have publicly identified his criminal conduct and brought multiple federal charges against him. Let today’s charges serve as a reminder to all cybercriminals. My office is dedicated to combating cybercrime and will spare no resources to bring to justice those who use ransomware attacks to target victims.”
The ransomware variants used by Matveyev are known as LockBit, Babuk, and Hive. The modus operandi was roughly the same: hackers would first gain access to vulnerable computer systems, then send a note to the victim demanding payment in exchange for decrypting the victim’s data or refraining from publicly disclosing it. If the victim did not pay the demanded amount, the data would typically be published on public websites, known as data leak sites.
Matveyev used a variety of aliases, including Wazawaka, m1x, Boriselcin, and Uhodiransomwar. He is charged with conspiracy to transmit ransom demands, conspiracy to cause damage to protected computers, and intentionally causing damage to protected computers. If convicted, he could face more than 20 years in prison.
source : https://www.justice.gov/opa/pr/russian-n...astructure
Mikhail Matveyev, a Russian citizen born in 1992 and living in Kaliningrad, is accused of hacking 2,800 victims and demanding ransoms totaling at least $400 million, the Justice Department said.
According to two indictments unsealed by the Justice Department, Matveyev, a Russian citizen and resident, used three different ransomware variants to target U.S. residents.
Victims of the attacks paid about $200 million, according to the charges. The victims include law enforcement agencies in New Jersey and Washington, D.C., health care organizations, and schools across the state.
In June 2020, Matveyev targeted police in Passaic Park and last May, a mental health nonprofit in Mercer County. He also targeted the Metropolitan Police Department in Washington, D.C.
“Thanks to the outstanding investigative work of prosecutors in my office and our partners at the FBI, Matveyev is no longer hiding in the shadows,” said Philip Sellinger, U.S. Attorney for the District of New Jersey. “We have publicly identified his criminal conduct and brought multiple federal charges against him. Let today’s charges serve as a reminder to all cybercriminals. My office is dedicated to combating cybercrime and will spare no resources to bring to justice those who use ransomware attacks to target victims.”
The ransomware variants used by Matveyev are known as LockBit, Babuk, and Hive. The modus operandi was roughly the same: hackers would first gain access to vulnerable computer systems, then send a note to the victim demanding payment in exchange for decrypting the victim’s data or refraining from publicly disclosing it. If the victim did not pay the demanded amount, the data would typically be published on public websites, known as data leak sites.
Matveyev used a variety of aliases, including Wazawaka, m1x, Boriselcin, and Uhodiransomwar. He is charged with conspiracy to transmit ransom demands, conspiracy to cause damage to protected computers, and intentionally causing damage to protected computers. If convicted, he could face more than 20 years in prison.
source : https://www.justice.gov/opa/pr/russian-n...astructure