WSJ News Exclusive | Ransomware Gang Masquerades as Real Company to Recruit Tech Talent

  • 📰 WSJ
  • ⏱ Reading Time:
  • 76 sec. here
  • 3 min. at publisher
  • 📊 Quality Score:
  • News: 34%
  • Publisher: 63%

France Nouvelles Nouvelles

France Dernières Nouvelles,France Actualités

A criminal organization believed to have built the software that shut down a U.S. fuel pipeline has set up a fake company to recruit potential employees, according to researchers at the intelligence firm Recorded Future and Microsoft

and hundreds of businesses. With hundreds of millions of dollars in illegal earnings, ransomware operators are increasingly operating like criminal startups with professionalized support staff, software development, cloud-computing services and media relations, security researchers say.How do you think cyberattacks will continue to change the landscape of national security? Join the conversation below.

“You can find more qualified people when you search more broadly,” said Andrei Barysevich, the head of Gemini Advisory, a division of Recorded Future. “There’s a lot of embedded law-enforcement agents on the dark web.” Fin7 has hacked thousands of computer systems and for years focused on stealing and selling credit-card information. The 70-person group caused more than $3 billion in damages to companies and individuals, federal prosecutors say.

On Monday, three federal agencies—the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation and the National Security Agency—, explaining how companies can protect themselves from BlackMatter and warning that in recent months, the ransomware “has targeted multiple U.S. critical infrastructure entities, including two U.S. Food and Agriculture Sector organizations.”

Mr. Hladyr maintained Fin7’s communications servers as well as a world-wide network of servers used to launch and manage cyberattacks, according to federal prosecutors. After pleading guilty to hacking charges, he was sentenced to 10 years in prison in April. Later, the recruit was sent software that Bastion Secure told him he would be using on the job, Mr. Barysevich said. He was asked to connect to what was described as a “client” network and collect information, but not told why or how it would be used. The software tools he was given were in fact hacking tools that a Recorded Future analysis linked to Fin7, Mr. Barysevich said.

Nous avons résumé cette actualité afin que vous puissiez la lire rapidement. Si l'actualité vous intéresse, vous pouvez lire le texte intégral ici. Lire la suite:

 /  🏆 98. in FR
 

Merci pour votre commentaire. Votre commentaire sera publié après examen.

They know that the FBI is completely occupied in tracking down the Jan 6 misfits and has no time for them.

Do they pay in real money tho?

nice

Cybercrime rises to a new level.

Babbling egomaniacs on the WSJ forum went off on Kamala Harris and the southern border in response to this article. You can build the wall as high as you like, but it won't stop hackers.

Ransomeware is just another business.

15 Highest paid world leaders and presidents in 2021 Annual salary age

France Dernières Nouvelles, France Actualités