Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

DoJ Charges Alleged Raccoon Infostealer Operator

Researcher by Researcher
October 27, 2022
in Cybersecurity
0
DoJ Seizes $3.6 Billion in Bitcoin Stolen From Bitfinex Hack
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The Department of Justice (DoJ) on Tuesday unveiled charges against an alleged operator of the Raccoon Infostealer malware, which it said has infected millions of computers. The DoJ also revealed that the FBI and law enforcement partners had dismantled the malware’s infrastructure in March.

Raccoon Infostealer was one of the most prolific information stealers in 2021 due to its ability to be easily customized and its ease of use. Since 2019, Raccoon Infostealer was sold as a service for $200 a month. Cybercriminals could use spear phishing, fake installers and other tactics to infect victims with the malware and steal personal data, such as login credentials or financial data.

On Tuesday, the DoJ said that a 26-year-old Ukrainian national, Mark Sokolovky, had been arrested in March by Dutch authorities and was being charged for his alleged role in conspiring to operate the infostealer as a service. Sokolovky is currently being held in the Netherlands pursuant to an extradition request by the U.S., according to the DoJ.

“This case highlights the importance of the international cooperation that the Department of Justice and our partners use to dismantle modern cyber threats,” said Deputy Attorney General Lisa O. Monaco in a statement. “As reflected in the number of potential victims and global breadth of this attack, cyber threats do not respect borders, which makes international cooperation all the more critical.”

Sokolovsky could potentially face up to 20 years in prison for wire fraud and money laundering offenses, five years for conspiracy to commit computer fraud and a two-year term for aggravated identity theft, according to U.S. authorities.

In addition to charges against Sokolovsky, the U.S. said that the FBI had partnered with law enforcement agencies in Italy and the Netherlands in order to bring down the infrastructure supporting Raccoon Infostealer and take its then existing version offline.

Since then, the FBI has collected data that had been stolen from computers infected with Raccoon Stealer and said it has identified more than 50 million unique credentials (including four million email addresses) and forms of authentication, including bank accounts, cryptocurrency addresses and credit card numbers. The FBI also created a website (raccoon.ic3.gov) where potentially impacted victims can input their email address in order to determine if it is part of the U.S. government’s retained repository of Raccoon Infostealer stolen data.

Over the past year the U.S. government has worked with other law enforcement and technology partners to disrupt or dismantle malicious infrastructure and arrest attackers behind various cybercrimes, from business email compromise (BEC) to malware attacks.

“We have once again leveraged our unique authorities, world-class capabilities, and enduring international partnerships to maximize impact against cyber threats,” said FBI Deputy Director Paul Abbate in a statement. “We will continue to use all available resources to disrupt these attacks and protect American citizens.”



Source link

Related articles

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
Tags: AllegedChargesDoJInfostealeroperatorRaccoon
Share76Tweet47

Related Posts

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
0

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in...

New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
0

Several days after news of exploit attempts against a zero day vulnerability in the GoAnywhere MFT secure file transfer tool...

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

February 8, 2023
0

World’s fastest real-time quantum random number generator with a photonic integrated chip. Credit: Bing Bai and Yao ZhengThe world of...

Sentra Raises $30 Million for DSPM Technology

Germany Appoints Central Bank IT Chief to Head Cybersecurity

February 8, 2023
0

The German government announced the appointment Tuesday of the European Central Bank’s head of IT systems to lead the national...

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

February 8, 2023
0

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved