Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Criminal Gang. Show all posts

German Authorities Identify Leaders Behind GandCrab and REvil Ransomware Operations

 

Two individuals believed to be central figures in major ransomware campaigns have been named by German authorities. The BKA points to Russians Daniil Maksimovich Shchukin and Anatoly Sergeevitsh Kravchuk as driving forces behind GandCrab and REvil during a period spanning 2019 into 2021. While operating under digital cover, their alleged involvement links them directly to widespread cyberattacks across multiple regions. 

Investigations suggest coordination patterns typical of structured criminal networks rather than isolated actors. Despite shifting online tactics, traces led back through financial flows and communication trails. Charges stem from activities that disrupted businesses globally before takedowns began reducing impact. Evidence compiled over months contributed to international cooperation efforts targeting infrastructure used. Though both remain at large, legal proceedings continue under European warrant systems. 

Allegedly, the pair coordinated global ransomware campaigns, hitting businesses across continents - among them, 130 incidents focused on German firms. Though payouts from those in Germany reached approximately $2.2 million, officials suggest total economic harm went far beyond, surpassing $40 million overall. Early in 2018 came GandCrab, rapidly rising as a dominant ransomware-for-hire platform. 

Affiliates ran attacks - profits split with central creators. Midway through 2019, the crew declared an end, boasting huge earnings. Not long afterward, REvil appeared, thought to stem from the same minds once behind GandCrab. Among cybercrime networks, REvil pushed further than most - adding tricks like leaking hacked files online or selling them off in secret bidding rounds. 

Not long after, headlines followed: Acer found itself under siege, then came the ripple chaos from Kaseya's breach, spreading across around 1,500 businesses tied into its systems. After the Kaseya incident, global police forces stepped up pressure on REvil. Through coordinated moves, they weakened key systems tied to the gang while tracking activity behind the scenes - this surveillance helped secure detentions in Russia by early 2022. Still, no clear trace has surfaced for Shchukin or Kravchuk since then. 

Now thought to be living in Russia, the suspects have prompted German officials to ask citizens for help finding their whereabouts. Appearing on Europe’s most wanted list, they come with photos plus notable physical traits meant to aid recognition. Tracking down these suspects represents progress toward holding key figures accountable in large-scale ransomware operations. 

Still, obstacles remain in bringing hackers to justice when they operate beyond borders - especially in areas where legal handover agreements are weak or absent.

Data Breaches: What Do They Mean?

Data protection is a critical component of any business, whether it's a bank, password manager, merchant, telecom provider, or another corporation. A top engineer’s personal computer has been compromised by hackers, the latest blow to LastPass, which recently fell, victim. There are no exceptions, even for the US Marshals Service. There is a large range of severity and effect associated with breaches, although not all are alike. 

There is no need to feel alone if you are concerned about cybersecurity after reading about the recent data breach at multiple organizations in the past few weeks.  

How is a Data Breach Defined? 

When there is a data breach, sensitive or confidential information may be exposed. Data breaches can happen in various ways, such as losing your Social Security number, bank account number, credit card number, email address, password, financial information, or other personal information. 

A data breach may occur as a result of a deliberate act or as a result of an accident. Cybercriminals can use your personal information shared with a company to hack into their database. You may also accidentally have your information exposed online by an employee of that company. No matter how you look at it, criminals may be able to take advantage of or profit from your personal information.

The fact remains that cybercriminals continue to come up with new and creative ways to steal data from businesses. In addition to accumulating and keeping information, cybercriminals may exploit it to profit. 

An armored vehicle loaded with valuables is being accelerated by a criminal gang. The haul they have made so far seems to have been quite lucrative. Nevertheless, in practice, they do not know who owns each safe, what is inside, what the combinations are, or how the lock fits together. 

That is exactly what happens when data thieves steal password managers, and password vaults, ultimately stealing encrypted data from them. Such a vault can only be opened by the owner, and the entire decryption process should take place locally on the owner's device if it is implemented properly. 

The risk that your credit card number may be included in stolen data is not as severe as you think, but it could still happen. There is a longstanding Payment Card Industry Data Security Standard (PCI-DSS) protocol defined in excruciating detail regarding credit card transactions, which contains written regulations that businesses must follow to secure credit cards. If your credit card is being used fraudulently (at least in the United States), you will not be liable for any charges made to your account. You should know that in most cases, the customer's credit card details are stored by a third-party provider, not by the merchant with whom you made the purchase. 

Whenever you shop online or browse websites, ensure your account details are protected. Many services keep your data secure. They encrypt it all and use No Knowledge techniques to verify your login password without knowing it or storing it anywhere. If your password is stored on an insecure website and is stolen during a hack, you have close control of that website's login information. Hackers can place orders on websites, transfer money, create emails in your name, and make bank transfers. This depends on the type of site they hack. They can even change your password to prevent access. 

Taking measures right away is imperative if you or someone you know has been affected by a data breach. 

  • Investigate what type of information was stolen and how it was stolen. If an organization in the U.S. identifies a customer information breach, it must notify customers. It is recommended that you identify which accounts might be compromised if you receive this type of notification. In addition, it is recommended that you accept any help the company offers you. This offer may include a free credit monitoring service.
  • Contact your financial institution. You must discuss the next steps you want to take with your credit card issuer or bank. This includes the possibility of changing your account numbers. Additionally, you can arrange for fraud alerts to be set up, and you can dispute or cancel fraudulent charges with your bank. 
  • Ensure that your passwords for every account are strong and changed regularly. You may have a compromised account even if your account is not the one that was breached (if you have used the same password throughout the years), When you use password managers, you can save strong passwords, manage them in a safe place, and access them whenever you need them.     
  • Check your free credit report to see how your credit score has changed. The AnnualCreditReports.com website can be used to request your free credit reports every year from each of the three credit reporting agencies. In this way, you will be able to spot errors and fraud, such as opening accounts without your authorization and detecting financial fraud.    
  • You might also want to consider freezing your credit records to ensure no one opens an account under your name. If you need to open a new account in the future, you'll need to lift the freezing procedure so that new accounts can be opened.      
  • Take a look at any activity that seems suspicious. You should monitor your accounts to see if anything suspicious is occurring. If you notice on your credit report that there are charges or withdrawals you did not make, or newly opened accounts that you did not open, you should dispute them. 
Your personal information is inevitably distributed around the web if you do not cut off all connections to the digital world. You might be surprised at how many of the sites that hold your sensitive information fail to protect it adequately. 

This often leads to the data being breached. Even though you cannot prevent this from occurring, you can minimize your exposure by following our suggestions. In addition, you can maximize your chances of recovery by being attentive to any breaches and responding accordingly as soon as they occur.