{"id":164997,"date":"2024-06-28T06:09:20","date_gmt":"2024-06-28T06:09:20","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=164997"},"modified":"2024-06-28T06:09:47","modified_gmt":"2024-06-28T06:09:47","slug":"us-reward-russias-gru-hacker","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/164997\/hacking\/us-reward-russias-gru-hacker.html","title":{"rendered":"US announces a $10M reward for Russia’s GRU hacker behind attacks on Ukraine"},"content":{"rendered":"
<\/div>\n

The US DoJ announced charges against a member of Russia’s military intelligence service GRU for conducting wiper attacks on Ukraine in 2022.<\/h2>\n\n\n\n

The US Department of Justice (DoJ) announced charges against Russian national Amin Timovich Stigal, who is a member of Russia’s military intelligence service GRU, for conducting wiper attacks on Ukraine in 2022.<\/p>\n\n\n\n

\"Russia<\/a><\/figure>\n\n\n\n

The man is accused of having a significant role in wiper attacks targeting the Ukrainian government computer networks in 2022.<\/p>\n\n\n\n

“A federal grand jury in Maryland returned an indictment yesterday charging Amin Timovich Stigal (\u0410\u043c\u0438\u043d \u0422\u0438\u043c\u043e\u0432\u0438\u0447 \u0421\u0442\u0438\u0433\u0430\u043b), 22, a Russian citizen, with conspiracy to hack into and destroy computer systems and data. In advance of the full-scale Russian invasion of Ukraine, targets included Ukrainian Government systems and data with no military or defense-related roles.” reads the press release<\/a> published by DoJ “Later targets included computer systems in countries that were providing support to Ukraine, including the United States.” <\/em><\/gwmw><\/p>\n\n\n\n

In January 2022 Stigal and other members of the GRU employed the WhisperGate<\/a> wiper in a series of attacks against Ukraine to aid the Russian military invasion of the country.<\/p>\n\n\n\n

The Russian hacker used a U.S.-based company to drop the WhisperGate<\/a> malware into dozens of Ukrainian government entities.<\/gwmw><\/p>\n\n\n\n

Microsoft first spotted the destructive malware\u00a0WhisperGate<\/a><\/strong> on January 13, 2022, it was used to target government, non-profit, and IT entities in Ukraine with a wiper disguised as ransomware.<\/p>\n\n\n\n

Microsoft attributed the attack to an emerging threat cluster tracked as \u201cDEV-0586<\/strong>.\u201d The experts pointed out that the operation has not overlapped with TTPs associated with past campaigns.<\/p>\n\n\n\n

\u201cMSTIC assesses that the malware, which is designed to look like ransomware but lacking a ransom recovery mechanism, is intended to be destructive and designed to render targeted devices inoperable rather than to obtain a ransom.\u201d reads the post<\/a> published by the Microsoft Threat Intelligence Center.<\/em><\/p>\n\n\n\n

\u201cAt present and based on Microsoft visibility, our investigation teams have identified the malware on dozens of impacted systems and that number could grow as our investigation continues.\u201d<\/em><\/p>\n\n\n\n

However, Reuters in an exclusive\u00a0reported\u00a0that the Belarus-linked APT group tracked as\u00a0UNC1151<\/a>\u00a0(aka Ghostwriter) was behind the attacks.<\/p>\n\n\n\n

According to Symantec, the WhisperGate wiper may have been\u00a0employed in attacks against unknown victims\u00a0since at least October 2021.<\/gwmw><\/p>\n\n\n\n

The conspirators also exfiltrated sensitive data from the Ukrainian computer systems, including patient health records. The DoJ reported that the state-sponsored hackers also defaced websites with threatening messages to instill fear among Ukrainians. They also offered the stolen data for sale online. In August 2022, they hacked the transportation infrastructure of a Central European country supporting Ukraine. From August 5, 2021, to February 3, 2022, they used the same infrastructure to probe computers of a federal government agency in Maryland, similar to their initial attacks on Ukrainian networks.<\/gwmw><\/p>\n\n\n\n

The Russian citizen remains at large, however, if convicted, Stigal faces a maximum penalty of five years in prison. <\/p>\n\n\n\n

“As\u00a0early\u00a0as 2021, digital environments\u00a0managed\u00a0by\u00a0Amin\u00a0Stigal\u00a0were\u00a0used\u00a0to stage malicious payloads used in various WhisperGate malware campaigns. Stigal is linked to WhisperGate operations against Ukrainian, NATO, and U.S. computer networks and has conspired with others to establish accounts on a social communications platform for use in WhisperGate operations.<\/gwmw><\/p>\n\n\n\n

The Rewards for Justice also announced\u00a0a reward up to\u00a0$10 million<\/a> for information leading to the identification or location of the man.<\/p>\n\n\n\n

“As\u00a0early\u00a0as 2021, digital environments\u00a0managed\u00a0by\u00a0Amin\u00a0Stigal\u00a0were\u00a0used\u00a0to stage malicious payloads used in various WhisperGate malware campaigns. Stigal is linked to WhisperGate operations against Ukrainian, NATO, and U.S. computer networks and has conspired with others to establish accounts on a social communications platform for use in WhisperGate operations.” reported <\/a>the Rewards for Justice.<\/p>\n\n\n\n

<\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, GRU)<\/strong><\/p>\n\n\n\n

<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

The US DoJ announced charges against a member of Russia’s military intelligence service GRU for conducting wiper attacks on Ukraine in 2022. The US Department of Justice (DoJ) announced charges against Russian national Amin Timovich Stigal, who is a member of Russia’s military intelligence service GRU, for conducting wiper attacks on Ukraine in 2022. The […]<\/p>\n","protected":false},"author":1,"featured_media":165000,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,183,5,6,7],"tags":[7902,4112,9508,9506,30,687,45,841,1533,15183,1858,12700,659],"class_list":["post-164997","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-cyber-warfare-2","category-hacking","category-intelligence","category-malware","tag-gru","tag-hacking","tag-hacking-news","tag-information-security-news","tag-malware-2","tag-pierluigi-paganini","tag-russia","tag-security-affairs","tag-security-news","tag-stigal","tag-ukraine","tag-whispergate","tag-wiper"],"yoast_head":"\n杭州江阴科强工业胶带有限公司