Current:Home > ScamsFeds launch hunt, offer $10 million reward for Russian ransomware mastermind -Wealth Evolution Experts
Feds launch hunt, offer $10 million reward for Russian ransomware mastermind
View
Date:2025-04-12 01:44:34
The U.S. government has launched a manhunt for a Russian fugitive with a $10 million reward on his head for running the world's largest ransomware scheme that tried to extort millions from notable targets such as Boeing and the United Kingdom's Royal Mail service.
Dmitry Yuryevich Khoroshev, 31, of Voronezh, Russia, was the leader and developer of LockBit, a mercenary ransomware group hired out for cyber hits on organizations ranging from nonprofits to hospitals to schools, according to a federal indictment unsealed this week.
“Most people would not consider being accused of creating and administering the most destructive ransomware group in the world as a badge of honor,” FBI – Newark Special Agent in Charge James E. Dennehy said. “Khoroshev, wears it like an Olympic Gold Medal."
Khoroshev's whereabouts are unknown. The Department of State announced a reward of up to $10 million for information that leads to his arrest.
Lockbit ransomware, first seen on Russian-language-based cybercrime forums in January 2020, has been detected all over the world, with organizations in the United States, India and Brazil among common targets, cybersecurity firm Trend Micro said last year.
Reuters reported last year that Lockbit hackers said they had obtained "a tremendous amount" of sensitive data from aerospace giant Boeing and would dump it online if Boeing didn't pay a massive ransom. Boeing confirmed in November that elements of the company's parts and distribution business had experienced "a cybersecurity incident," but said there was no threat to aircraft or flight safety.
LockBit also threatened at one point to publish stolen data if the Royal Mail service in the U.K. failed to pay a ransom. In an email response to Reuters, Royal Mail said evidence from its investigation suggested that the data allegedly obtained from its network did not contain any financial information or other sensitive customer information.
Khoroshev is charged with conspiracy to commit fraud, extortion and related activity in connection with computers; conspiracy to commit wire fraud; and eight counts of each intentional damage to a protected computer, extortion in relation to information unlawfully obtained from a protected computer and extortion in relation to intentional damage to a protected computer.
The Justice Department’s unmasking and indictment of the Russian national behind LockBit is the latest in federal efforts to stop the ransomware group behind attacks in almost 120 countries that extorted half a billion dollars, of which Khoroshev took 20%, according to federal prosecutors in New Jersey. Five coconspirators have been charged and two are awaiting custody.
The announcement follows an operation in February by federal officials and law enforcement agencies from the United Kingdom to disrupt to LockBit's schemes, said Nicole M. Argentieri, principal deputy assistant attorney general, in a video announcing the indictment.
The Department of Justice official called the ransomware “a menace that attacks schools, hospitals and other critical infrastructure.”
A cyber gun for hire
The ransomware, or software, Khoroshev developed allowed criminals to steal a victim’s data and hold it under the threat of publishing if the victim didn’t pay, according to the indictment.
The ransomware operates by using a number of techniques, such as hacking or stolen credentials, to access a victim’s computer, the indictment says. Then, a custom version of LockBit is used to steal documents and data.
Afterwards, the criminals leave behind a “ransom note” with instructions on how to get in touch for negotiations and a threat to publish if the victim doesn’t, the indictment says. Criminals demanded the ransom in Bitcoin, typically.
Khoroshev began developing and marketing the ransomware under aliases including “LockBitSupp” and “putinkrab” in September 2019, according to the filing. Third parties effectively rented it to deploy on victims, but the Russian national kept watch and even participated in ransom negotiations, the indictment says.
He marketed it on dark web cybercriminal forums, paying people $1,000 to get tattoos of the LockBit logo as a form of corporate branding of sorts, and turned the cyber gun for hire “into a massive criminal organization that has, at times, ranked as the most prolific and destructive ransomware group in the world,” the indictment says.
More:Global hacking campaign: Energy Department and other agencies hit by wave of cyberattacks.
Taking down “putinkrab”
After about four years of ransomware schemes, law enforcement agencies from the U.S., United Kingdom and “around the world” left LockBit “practically inoperable” in a coordinated strike in February, according to the indictment.
U.K. authorities reviewed seized LockBit data and discovered lists of buyers, victims and documents that supposedly had been deleted after the ransom was paid, the indictment says.
Of the 2,500 victims, around 1,800 were in the U.S. with at least 55 in New Jersey, according to the filing. However, the range of victims spanned from Argentina and Kenya to Finland and China.
Among the victims noted in the lawsuit was a “multinational aeronautical and defense corporation headquartered in Virginia” that received a ransom demand of $200 million. Attacks were costly for victims to handle and caused lost revenue.
Also noted were a Florida-based medical services business; a “major” Taiwanese semiconductor manufacturer; a German automotive parts conglomerate; and, in New Jersey, law enforcement agencies in Passaic and Monmouth counties and a Somerset County school district.
After the February disruption, Khoroshev attempted to launch LockBit again. In an effort to beat out the ransomware competition, he “communicated with law enforcement and offered his services in exchange for information regarding the identity” of competitors, according to the indictment.
The Russian national is quoted saying, “give me the names of my enemies.
More: Russian hacker charged by U.S. in ransomware attacks that raked in over $200 million.
veryGood! (9776)
Related
- Travis Hunter, the 2
- Do Hundreds of Other Gas Storage Sites Risk a Methane Leak Like California’s?
- Climate Change Is Happening Faster Than Expected, and It’s More Extreme
- Troubled by Trump’s Climate Denial, Scientists Aim to Set the Record Straight
- B.A. Parker is learning the banjo
- 2016: When Climate Activists Aim to Halt Federal Coal Leases
- This city is the most appealing among aspiring Gen Z homeowners
- California plans to phase out new gas heaters by 2030
- The FBI should have done more to collect intelligence before the Capitol riot, watchdog finds
- How to keep safe from rip currents: Key facts about the fast-moving dangers that kill 100 Americans a year
Ranking
- Charges tied to China weigh on GM in Q4, but profit and revenue top expectations
- 2017 One of Hottest Years on Record, and Without El Niño
- 2016: When Climate Activists Aim to Halt Federal Coal Leases
- In Wake of Gulf Spill, Louisiana Moves on Renewable Energy
- Questlove charts 50 years of SNL musical hits (and misses)
- Congress Opens Arctic Wildlife Refuge to Drilling, But Do Companies Want In?
- City in a Swamp: Houston’s Flood Problems Are Only Getting Worse
- COVID Risk May Be Falling, But It's Still Claiming Hundreds Of Lives A Day
Recommendation
Rams vs. 49ers highlights: LA wins rainy defensive struggle in key divisional game
2015: The Year the Environmental Movement Knocked Out Keystone XL
Arctic Report Card: Lowest Sea Ice on Record, 2nd Warmest Year
Today’s Climate: June 14, 2010
Alex Murdaugh’s murder appeal cites biased clerk and prejudicial evidence
Wehrum Resigns from EPA, Leaving Climate Rule Rollbacks in His Wake
These Candidates See Farming as a Climate Solution. Here’s What They’re Proposing.
Florida arranged migrant flights to California, where officials are considering legal action