Experts believe that the arrest of Ilya Sachkov, the founder and CEO of Group-IB, will not affect the company's work, nor will it affect the Russian information security market. Criminal cases against the heads of companies working in the field of information security have already happened in Russia.
On September 28, the office of Group-IB was searched, and the next day the court put the businessman in custody for two months on charges of treason. He might face up to 20 years in prison.
It is still unclear what exactly Ilya Sachkov's crime was. Group-IB lawyers are studying the court order, and employees are confident in the innocence of their leader and in his business reputation. At the moment, the technical director and co-founder of Group-IB Dmitry Volkov temporarily heads the company.
Ilya Sachkov and Dmitry Volkov opened Group-IB in 2003. The company creates products to combat online fraud, works in the field of computer forensics, consulting and auditing of information security systems. As noted on the Group-IB website, it cooperates with Interpol, Europol and the OSCE, provides assistance to Russian special services and law enforcement agencies in operations against hacker groups. The company's income can be at least 2 billion rubles ($27.2 million) per year, excluding foreign assets.
According to one version, Group-IB's problems could arise due to too close contacts of its employees with Western intelligence services. So, in 2020, the US Department of Justice accused Nikita Kislitsin, head of the Department of network security of Group-IB, of trying to sell stolen data of users of the social network Formspring. As follows from the testimony of Kislitsin, in order to avoid punishment, he leaked to the FBI “a lot of information on Russian hackers and hackers in uniform.” According to some media reports, Sachkov personally allegedly agreed to this.
Another theory is that the detention of Ilya Sachkov was influenced by the interrogation of Russian hacker Pavel Sitnikov, which took place on the eve of the searches in Group-IB. According to the hacker's representative, Sitnikov repeatedly criticized the activities of Group-IB and the company's founder Ilya Sachkov, and also collected compromising information on him.
Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten countries around the world, including Russia. Since March, Russian companies in the fuel and energy sector and the aviation industry have been targeted, at least two attacks have been successful. Experts believe that pro-government groups may be behind the attacks.
According to Positive Technologies, the first attacks were recorded in March. Hackers are interested in stealing data from compromised networks.
India, the United States, Taiwan and Germany were also victims of the attacks. Compromised government servers were discovered in those countries.
The new group was named ChamelGang from the word chameleon, as hackers disguise malware and network infrastructure as legitimate services. The grouping tools include the new, previously undescribed ProxyT malware, BeaconLoader and the DoorMe backdoor, which allows a hacker to gain access to the system.
In one of the attacks, the hackers first attacked the subsidiary, and two weeks later, the parent company. They found out the password of the local administrator on one of the servers and penetrated the company's network using the Remote Desktop Protocol (RDP). Hackers remained undetected on the corporate network for three months and during that time gained control over most of the network, including critical servers and nodes.
In the second attack in August, attackers took advantage of a chain of related vulnerabilities in Microsoft Exchange to penetrate the infrastructure. Hackers were in the organization's infrastructure for eight days and did not have time to cause significant damage.
Kaspersky Lab cybersecurity expert Alexey Shulmin confirmed the targeted nature of the attack and the wide geography of victims. He added that some grouping utilities have an interface in Chinese.
Experts believe that attacks on strategically important industrial facilities, including the fuel and energy sector and the aviation industry, are often carried out by cyber mercenaries and pro-government groups.