Trickbot Cybercrime Gang Sanctioned by the US and UK

Trickbot Cybercrime Gang Emblem

During the height of the COVID-19 pandemic in 2020, a Russian hacking group deployed the “Conti” malware on hospitals, schools, businesses, local authorities, and the Scottish Environment Protection Agency. The effects of the ransomware were so severe that between the United Kingdom and the United States, research from Chinalysis shows that the threat actors extorted $274m!!

The individuals responsible for the severe cybercrimes were finally identified just last month but any arrests are IMPOSSIBLE as the individuals are residing in Russia out of the jurisdiction of the UK and the US. As of now, the responsible threat actors have been sanctioned by the US and the UK, freezing and obtaining any assets the individuals have outside of Russia.

"This is a hugely significant moment for the UK and our collaborative efforts with the US to disrupt international cyber-criminals," said National Crime Agency director general Graeme Biggar. "The sanctions are the first of their kind for the UK and signal the continuing campaign targeting those responsible for some of the most sophisticated and damaging ransomware that has impacted the UK and our allies."

The seven known individuals responsible have been listed below, including their roles (information provided from U.S. Department of The Treasury) -

Vitaly Kovalev: Vitaly Kovalev is also known as the online as “Bentley” and “Ben”. Today, an indictment was unsealed in the U.S. District Court for the District of New Jersey charging Kovalev with conspiracy to commit bank fraud and eight counts of bank fraud in connection with a series of intrusions into victim bank accounts held at various U.S.-based financial institutions that occurred in 2009 and 2010, predating his involvement in Dyre or the Trickbot Group.

Maksim Mikhailov: has been involved in development activity for the Trickbot Group. Maksim Mikhailov is also known as the online moniker “Baget”.

Valentin Karyagin: has been involved in the development of ransomware and other malware projects. Valentin Karyagin is also known as the online moniker “Globus”.

Mikhail Iskritskiy: has worked on money-laundering and fraud projects for the Trickbot Group. Mikhail Iskritskiy is also known as the online moniker “Tropa”.

Dmitry Pleshevskiy: worked on injecting malicious code into websites to steal victims’ credentials. Dmitry Pleshevskiy is also known as the online moniker “Iseldor”.

Ivan Vakhromeyev: has worked for the Trickbot Group as a manager. Ivan Vakhromeyev is also known as the online moniker “Mushroom”.

Valery Sedletski: has worked as an administrator for the Trickbot Group, including managing servers. Valery Sedletski is also known as the online moniker “Strix”.

 

Your Security is our Priority

Your friendly Support Team

The Computer Department Logo

Speak to us about all your computer needs

This is Part of our Cyber Security awareness educational campaign. Through this training, you will learn awareness and key principles, and best practices to protect yourself, your organisation, and the public from cyber attackers. You will also be equipped with the knowledge to identify potential threats and take action before any damage can occur.

 
Previous
Previous

Cyber Attack Alert: Malware Sending Millions of Fake Emails, Microsoft Alerts

Next
Next

eSafety is no joke. Protect your online passwords with these tips.