[ad_1]
The US government has sanctioned two key members of Lockbit, the Russian-speaking hacking and extortion gang accused of launching ransomware attacks against victims across the US and internationally.
In a post on Tuesday, the US Treasury confirmed it was imposing sanctions on two Russian nationals, Artur Sungatov and Ivan Gennadievich Kondratiev.
Sungatov and Kondratiev Indicted separately by US prosecutors on Tuesday For his alleged involvement with Lockbit.
Kondratiev is also accused of involvement with the REvil, RansomEXX and Avaddon Ransomware gangs.
U.S. Deputy Secretary of the Treasury Wally Adeyemo said, “The United States will not tolerate efforts to extort and steal from our citizens and institutions.” in a statement, “We will continue our whole-of-government approach to defending against malicious cyber activities, and use all available tools to hold accountable the actors who enable these threats.”
The newly imposed sanctions mean it is now illegal for US businesses or individuals to make payments or otherwise transact with those named by the sanctions, a tactic commonly used to discourage US victims from paying hackers’ ransoms. Is performed.
Imposing sanctions on individuals behind cyber attacks It has become more difficult for individual hackers to profit from ransomwareInstead of targeting groups that might rebrand or change names to avoid sanctions.
Those caught violating US sanctions laws, such as companies paying sanctioned hackers, can face hefty fines and criminal prosecution.
The sanctions were lifted hours after the announcement by US and UK officials A global law enforcement operation aimed at disrupting Lockbit’s infrastructure and operations, Authorities announced the seizure of Lockbit’s infrastructure on the gang’s own dark web leak site, which the group Previously it was used to publish stolen data of victims Until the ransom was paid.
US prosecutors have accused Lockbit’s operators of using ransomware in more than 2,000 cyberattacks against victims in the US and around the world, forcing nearly $120 million in ransom payments since its founding in 2019.
Lockbit has taken credit for hundreds of hacks over the years, including California Department of FinanceThe UK postal service Royal Mail And American Dental Insurance Company MCNADue to which the personal information of millions of people is being affected.
The US sanctions announced on Tuesday are the latest round of actions targeting the hackers behind Lockbit and other prolific ransomware gangs.
In 2022, Russian-Canadian dual citizenship Mikhail Vasiliev was arrested Accused of launching multiple Lockbit ransomware attacks. A year later, American officials Ruslan Magomedovich Astamirov was arrested Under similar charges. Both suspects remain in custody awaiting trial.
The third suspect, Russian citizen Mikhail Pavlovich Matveev, was accused of involvement in multiple ransomware operations, including Lockbit. Matveev, who is still at large, was Subject to US sanctions in 2023Preventing US victims from paying ransom to him or his associated ransomware gangs, including hive and babuk, The US government has also offered a reward of $10 million for information leading to Matveev’s arrest.
In its announcement on Tuesday, the US government has not yet named the suspected Lockbit ringleader, who goes by the alias Lockbitsupp. The now-seized Lockbit dark web leak site says law enforcement plans to release more information about the alleged leader on Friday, including details of a $10 million reward for information leading to his location or identity. also includes.
Apart from sanctions, the US does not ban or otherwise restrict victims from paying ransom, although the FBI has long advised victims not to pay hackers out of fear of future cyberattacks. Ransomware victims who pay ransom are vulnerable, security researchers say More likely to experience ransomware attacks later,
Read more on TechCrunch:
[ad_2]
Thanks For Reading