Hacker Arrested In Russia For Extorting Money For Decrypting Data

✨ Megiddo

✨ President ✨
Staff member
Joined
May 15, 2016
Messages
14,534
Likes
2,645
Points
1,730
After the transfer of the cryptocurrency to the hacker, representatives of the company filed a statement with the Ministry of Internal Affairs.

efa48c1efbeb50165b7b415f1359c06e.jpg


Irina Volk, representing the Ministry of Internal Affairs of the Russian Federation, told reporters about the arrest of a resident of Rostov-on-Don, suspected of breaking into the database of a Russian company. It is unknown whether he is a member of a hacker group or a lone hacker.
"The operatives detained a 35-year-old resident of Rostov-on-Don, suspected of illegal access to computer information and extortion. It was preliminary established that in early 2020, the attacker encrypted significant computer information contained in the local network of a large Russian company using a cryptographic algorithm. For decoding, he demanded to pay a monetary reward in cryptocurrency, "she said.

The man asked for 0.8 bitcoin - about 500 thousand rubles. After the transfer of the cryptocurrency to the hacker, representatives of the company filed a statement with the Ministry of Internal Affairs. After the arrest, equipment with information containing evidence was seized from the suspect. A criminal case was initiated under Part 2 of Art. 163 ("Extortion") and Part 2 of Article 272 of the Criminal Code of the Russian Federation ("Unlawful Access to Computer Information"). The suspect is in custody.

Earlier, Rosfinmonitoring announced plansdevelop a system for analyzing cryptocurrency transactions using artificial intelligence. The system itself is being developed due to the need to create effective government control over the industry of virtual assets, which are often used by criminals for many illegal schemes. Its users will be both government authorities and the Bank of Russia or other financial organizations.

Recently, hacker groups have begun to practice publishing confidential files of the victim in case of non-payment of the ransom. A prime example is the Maze group, which regularly uploads data to the Web from large companies that refused to pay her ransom ( recent examples are LG and Xerox).
__________________
 
Top Bottom