Ukrainian cops cuff two over $150m ransomware gang allegations, seize $1.3m in cryptocurrency

Was it REvil? We don't (yet) know for sure

Ukrainian police have reportedly arrested two members of a ransomware gang – and while some have fingered REvil, no firm details have been published by cops from multiple countries.

A round of speculation was triggered when inter-EU law enforcement body Europol declared this morning that Ukrainian fuzz had arrested "two prolific ransomware operators known for their extortionate demands," claimed to be up to €70m.

One of the two suspects arrested on 28 September, according to the National Police of Ukraine, was a "hacker". The other allegedly "helped to withdraw money obtained by criminal means." $1.3m in cryptocurrency was said to have been frozen.

A multinational police operation with input from France's National Gendarmerie and the US Federal Bureau of Investigation helped lead the Ukraine cops to their targets, with support from Europol and Interpol.

The 25-year-old suspect allegedly deployed "virus software", compromising remote-working software, with one attack vector being "through spam-mailings on corporate e-mail boxes of malicious content."

As is their usual practice, the Ukrainian police published a video of themselves wandering around the accused perpetrator's home going through his belongings – which included Apple laptops, a gaming PC, and large quantities of $100 banknotes, said to be $375,000 in total.

Youtube Video

Two vehicles (described as "luxury" with no further detail) were also seized by local police, as were a total of seven properties.

"In total, the hacker attacked more than 100 foreign companies in North America and Europe," said the Ukrainian police, adding that they blamed the 25-year-old arrestee for causing $150m of damage to Western organisations.

Phone calls to Europol's press office went unanswered. We have contacted the Ukrainian police by email and will update this article if they respond.

In summer, police in Ukraine arrested half a dozen people whom they said were members of the Clop ransomware gang.

But was it REvil?

Numerous people speculated on Twitter that the latest Ukrainian arrests were members of the REvil ransomware gang. This was based solely on Europol's claim that the two main accused had once issued an "extortionate" €70m ransom demand, which has not been repeated by cops in Ukraine.

REvil once issued a ransom demand for $70m (c €60.1m) against managed service provider Kaseya) but that is not the same sum.

The REvil gang pulled its Tor-hosted portals offline in July, prompting speculation that the Russian-speaking criminal group had finally met its comeuppance. On the flip side, security intelligence firm Flashpoint said in September it had found comments on forums frequented by ransomware criminals complaining that REvil's rentable malware was ripping them off through a secret backdoor.

Separately, today McAfee issued its October threat report, saying: "Ryuk, REvil, Babuk, and Cuba ransomware actively deployed business models supporting others' involvement to exploit common entry vectors and similar tools. These, and other groups and their affiliates, exploit common entry vectors and, in many cases, the tools we see being used to move within an environment are the same."

It's a common theme: ransomware gangs tend to break in using known vulnerabilities or simply through well-crafted phishing emails, and if the Ukrainians are to be believed, that was one of the methods their suspect used. It's usually the front door, rarely the back. ®

Similar topics

Other stories you might like

  • Ubuntu 21.10: Plan to do yourself an Indri? Here's what's inside... including a bit of GNOME schooling

    Plus: Rounded corners make GNOME 40 look like Windows 11

    Review Canonical has released Ubuntu 21.10, or "Impish Indri" as this one is known. This is the last major version before next year's long-term support release of Ubuntu 22.04, and serves as a good preview of some of the changes coming for those who stick with LTS releases.

    If you prefer to run the latest and greatest, 21.10 is a solid release with a new kernel, a major GNOME update, and some theming changes. As a short-term support release, Ubuntu 21.10 will be supported for nine months, which covers you until July 2022, by which point 22.04 will already be out.

    Continue reading
  • Heart FM's borkfast show – a fine way to start your day

    Jamie and Amanda have a new co-presenter to contend with

    There can be few things worse than Microsoft Windows elbowing itself into a presenting partnership, as seen in this digital signage for the Heart breakfast show.

    For those unfamiliar with the station, Heart is a UK national broadcaster with Global as its parent. It currently consists of a dozen or so regional stations with a number of shows broadcast nationally. Including a perky breakfast show featuring former Live and Kicking presenter Jamie Theakston and Britain's Got Talent judge, Amanda Holden.

    Continue reading
  • Think your phone is snooping on you? Hold my beer, says basic physics

    Information wants to be free, and it's making its escape

    Opinion Forget the Singularity. That modern myth where AI learns to improve itself in an exponential feedback loop towards evil godhood ain't gonna happen. Spacetime itself sets hard limits on how fast information can be gathered and processed, no matter how clever you are.

    What we should expect in its place is the robot panopticon, a relatively dumb system with near-divine powers of perception. That's something the same laws of physics that prevent the Godbot practically guarantee. The latest foreshadowing of mankind's fate? The Ethernet cable.

    By itself, last week's story of a researcher picking up and decoding the unintended wireless emissions of an Ethernet cable is mildly interesting. It was the most labby of lab-based demos, with every possible tweak applied to maximise the chances of it working. It's not even as if it's a new discovery. The effect and its security implications have been known since the Second World War, when Bell Labs demonstrated to the US Army that a wired teleprinter encoder called SIGTOT was vulnerable. It could be monitored at a distance and the unencrypted messages extracted by the radio pulses it gave off in operation.

    Continue reading

Biting the hand that feeds IT © 1998–2021