Authorities Take Down Vendor of Extensively Used RAT Malware – Supply: www.govinfosecurity.com

Cybercrime
,
Fraud Management & Cybercrime
,
Malware as-a-Service

2 Males Arrested in Malta, Nigeria for Hawking Malware on Hacking Boards Since 2012

Cal Harrison
February 9, 2024

Image: Shutterstock

Federal authorities have seized internet domains and arrested two men in Malta and Nigeria who they say served as sales and customer service reps for a dark web business that sold RAT malware to cybercriminals over a 12-year period, leading to the “takeover and infection of computers worldwide.”

See Also: Live Webinar | Securing the Cloud: Mitigating Vulnerabilities for Government

In response to a U.S. Justice Division assertion on Friday, authorities in Malta arrested Daniel Meli, 27, of Zabbar, Malta, on Feb. 7 on the DOJ’s request. Meli, who made his preliminary look earlier than a Justice of the Peace choose in Valletta, Malta, is going through fees from a federal grand jury indictment within the U.S. District Court docket for the Northern District of Georgia on Dec. 12 for inflicting unauthorized harm to protected computer systems, illegally promoting and promoting an digital interception machine, and taking part in a conspiracy to commit a number of pc intrusion offenses.

Authorities said he marketed, bought and maintained two extensively used strains of malware – Warzone RAT and an earlier model generally known as the Pegasus RAT – in on-line computer-hacking boards since not less than 2012.

“Specifically, Meli allegedly assisted cybercriminals seeking to use RATs for malicious purposes and offered teaching tools for sale, including an eBook,” the DOJ stated. “He sold through an online criminal organization called Skynet-Corporation. He also provided online customer support to purchasers of both RATs.”

Authorities in Boston seized www.warzone.ws and three associated domains that “sold the Warzone remote access Trojan, which gives cybercriminals the ability to” browse sufferer file programs, take screenshots, document keystrokes, steal sufferer usernames and passwords, and watch victims via their net cameras.”

FBI brokers in Massachusetts covertly purchased and analyzed the Warzone RAT malware
and confirmed its malicious capabilities, in response to courtroom paperwork.

Additionally arrested on Feb. 7 was Prince Onyeoziri Odinakachi, 31, of Nigeria, by the Port Harcourt Zonal Command of Nigeria’s Financial and Monetary Crimes Fee. A federal grand jury within the U.S. District Court docket for the District of Massachusetts on Jan. 30 indicted Odinakachi for conspiracy to commit a number of pc intrusion offenses, together with acquiring licensed entry to protected computer systems to acquire data and inflicting unauthorized harm to protected computer systems. The DOJ stated that between June 2019 and March 2023, Odinakachi offered clients with on-line help for Warzone RAT.

The takedown encompassed a world legislation enforcement operation led by FBI particular brokers in Boston and Atlanta and coordinated via Europol. Legislation enforcement businesses in Canada, Croatia, Finland, Germany, the Netherlands and Romania helped safe the servers internet hosting the Warzone RAT infrastructure.

“Today’s actions targeting the Warzone RAT infrastructure and personnel are another example of our tenacious and unwavering commitment to dismantling the malware tools used by cybercriminals,” stated Joshua S. Levy, the appearing U.S. lawyer for the District of Massachusetts.

Unique Put up URL: https://www.govinfosecurity.com/authorities-take-down-seller-widely-used-rat-malware-a-24338

Author: CISO2CISO Editor 2
Date: 2024-02-10 14:46:25

Source link

spot_imgspot_img

Subscribe

Related articles

spot_imgspot_img
Alina A, Toronto
Alina A, Torontohttp://alinaa-cybersecurity.com
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.

LEAVE A REPLY

Please enter your comment!
Please enter your name here