Bank-account-raiding Goznym malware bust: Five suspects collared, five still on the run. $100m feared stolen

Most exciting Enid Blyton book yet – Five accused of international fraud?


Ten people have been accused of masterminded the theft of roughly $100m from bank accounts using the Goznym malware. Five have been arrested, charged, and are facing prosecution, and five have been indicted and remain at large. An eleventh person linked to the software nasty is awaiting sentencing after admitting his crimes.

Goznym was a highly sophisticated piece of Windows malware that raided the online bank accounts of some 40,000 victims: it would lurk on PCs waiting for folks to log into their accounts, snatch those details, and pass them onto crooks who would then clean out the accounts. The Feds and cops made their move, smashing the crime ring by nabbing its suspected members, after dismantling the Avalanche server network, which was set up to spam out emails that tricked victims into downloading and installing software nasties like Goznym.

“This takedown highlights the importance of collaborating with our international law enforcement partners against this evolution of organized cybercrime,” said FBI Pittsburgh Special Agent in Charge Robert Jones on Thursday.

“Successful investigation and prosecution is only possible by sharing intelligence, credit and responsibility. Our adversaries know that we are weakest along the seams and this case is a fantastic example of what we can accomplish collectively."

Goznym surfaced in 2016, and was able to circumvent antivirus packages by encrypting its code and data. In order to develop this nasty, investigators claimed, the gang recruited technical specialists, who advertised their programming and cryptography skills on dark web forums, and pulled together the Goznym team: think Oceans 11 with extra scumminess.

The indictment [PDF] of all ten was announced today at Europol headquarters by crimebusters from the US, Georgia, Ukraine, Moldova, Germany, and Bulgaria.

Arrests

We're told the alleged ringleader Alexander Konovolov, 35, of Tbilisi, Georgia, and his alleged technical assistant Marat Kazandjian, 31, of Kazakhstan and Tbilisi, Georgia, have been arrested and charged in that nation in connection with the banking malware, and are being prosecuted there.

Krasimir Nikolov, of Varna, Bulgaria, is accused of being a casher, a person who funnels victims' funds into bank accounts controlled by the gang: he was arrested in 2016 by Bulgarian authorities, and extradited to the US. He pleaded guilty to banking fraud charges last month, and will be sentenced in August this year.

Gennady Kapkanov, 36, of Poltava, Ukraine, who allegedly ran the Avalanche server farm that spewed more than 20 strains of malware, was also arrested in 2016, in dramatic fashion. As the plod tried to storm his apartment, he held them off with an assault rifle, according to the US Department of Justice, but was cuffed and now faces multiple charges in his home country.

Alexander Van Hoof, 45, of Nikolaev, Ukraine, was also arrested and charged with banking offenses as he was also a suspected casher for the crew. Meanwhile, Moldovan cops swooped on Eduard Malanici, 32, of Balti, Moldova, who allegedly encrypted the malware, along with two unnamed associates, and faces prosecution in that nation.

At large

Five Russian members of the team named [PDF] in the indictment remain on the run. They include the suspected malware designer Vladimir Gorin, of Orenburg, Russia, and Konstantin Volchkov, 28, of Moscow, Russia, who is said to have designed the phishing emails to spread the malware. Viktor Eremenko, 30, of Stavropol, Russia, and Farkhad Manokhin, of Volgograd, Russia, are also accused of helping the gang drain cash out of victims' compromised bank accounts. Manokhin was cuffed in Sri Lanka in 2017, at the request of US prosecutors, but managed to flee to Russia where he remains at large. Ruslan Katirkin, 31, of Kazan, Russia, is also accused of being a casher for the gang.

“International law enforcement has recognized that the only way to truly disrupt and defeat transnational, anonymized networks is to do so in partnership,” said US Attorney for Pennsylvania Scott Brady.

“The collaborative and simultaneous prosecution of the members of the GozNym criminal conspiracy in four countries represents a paradigm shift in how we investigate and prosecute cybercrime. Cybercrime victimizes people all over the world. This prosecution represents an international cooperative effort to bring cybercriminals to justice.” ®

Similar topics


Other stories you might like

  • Emotet malware gang re-emerges with Chrome-based credit card heistware
    Crimeware groups are re-inventing themselves

    The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.

    Once the data – including the user's name, the card's numbers and expiration information – is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses, according to researchers with cybersecurity vendor Proofpoint's Threat Insight team.

    The new card information module is the latest illustration of Emotet's Lazarus-like return. It's been more than a year since Europol and law enforcement from countries including the United States, the UK and Ukraine tore down the Emotet actors' infrastructure in January 2021 and – they hoped – put the malware threat to rest.

    Continue reading
  • HelloXD ransomware bulked up with better encryption, nastier payload
    Russian-based group doubles the extortion by exfiltrating the corporate data before encrypting it.

    Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.

    The new capabilities make the ransomware, first detected in November 2021 - and the developer behind it even more dangerous - according to researchers with Palo Alto Networks' Unit 42 threat intelligence group. Unit 42 said the HelloXD ransomware family is in its initial stages but it's working to track down the author.

    "While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k," the researchers wrote in a blog post.

    Continue reading
  • Symbiote Linux malware spotted – and infections are 'very hard to detect'
    Performing live forensics on hijacked machine may not turn anything up, warn researchers

    Intezer security researcher Joakim Kennedy and the BlackBerry Threat Research and Intelligence Team have analyzed an unusual piece of Linux malware they say is unlike most seen before - it isn't a standalone executable file.

    Dubbed Symbiote, the badware instead hijacks the environment variable (LD_PRELOAD) the dynamic linker uses to load a shared object library and soon infects every single running process.

    The Intezer/BlackBerry team discovered Symbiote in November 2021, and said it appeared to have been written to target financial institutions in Latin America. Analysis of the Symbiote malware and its behavior suggest it may have been developed in Brazil. 

    Continue reading

Biting the hand that feeds IT © 1998–2022