Many cyber security researchers who followed Trickbot are widely told that they were not aware of the advertisement. An unknown account on the social media platform X recently claimed that Kovalev used the strict handle and spread the alleged details of it. According to the X account, according to the X account, according to the X account and a database of penetrating and leaked records collected by the Labs District 4, but it did not receive any response.
Meanwhile, Kovalev’s name and face may be amazingly familiar to those who were following the last disclosure of Trickbot. This is because Kovalev has been jointly punished US and UK In early 2023, his alleged involvement as a first member of Trickbot. It was also He was accused in the United States At that time with piracy associated with alleged bank fraud in 2010. The United States was added to The most mill menu. In all this activity, the United States and the United Kingdom have linked Kovalev to “Ben” and “Bente”. 2023 sanctions were not mentioned in the strict handle. In fact, the Kovalv’s accusation regulations in 2023 were mainly noticeable because its use of “Bentley” as a handle was designed to be “historic” and distinct from that. Another major member of Trickbot also went to “Bentley“
Trickbot Ransomware first appeared in 2016, after its members Move Drumma harmful programs This was broken by the Russian authorities. Throughout its life, the Trickbot group – which used harmful programs of the same name, has overlapped, along with other ransom variables such as Ryuk, Itedid and Diadol – an integral manner in operations and employees with the Conte gang. In early 2022, Conte published a statement that supports Russia’s widespread invasion of Ukraine, and the cybersecurity researcher that infiltrated the groups. More than 60,000 messages from Trickbot and Conti leakedDisclosure of a wide range of information about their daily operations and structure.
Stern spent like the “CEO” of Trickbot and Conti groups as a legitimate company, the chat messages that were leaked Her wire analysis and Security researchers Show.
Leslie says in the future: “Trekbot is a model for modern business” as the experimental model that was adopted by countless groups followed. ” “While there were definitely organized groups that precede Trickbot, Ashraf Stern had a period of Russian e -crimes with a high level of professionalism. This trend continues today, and it is cloned all over the world, and it is visible in most active groups on the dark network.”
Stern’s intensity has been widely documented within Russian cybercrime. Cryptocrency Tracing Chainalysis does not name online electronic actors and refused to comment on the BKA identity, but the company confirmed that the strict personality alone is one of the most ransom actors ever.
“The investigation revealed that Stern had achieved great revenues from illegal activities, especially with regard to Ransomware,” BKA spokesman told Wire.
Keith Garvis, a senior security researcher in the anti -threat unit at Sophos, says. “I think he might always live in this organizational role.”
The increasing evidence in recent years indicated that Stern has at least some loose links to the Russian intelligence services, including its main security agency, Federal Security Service (FSB). The aforementioned rear in preparing an office for “Governmental topicsIn July 2020, while The researchers have seen Other members From the Trickbot group, Stern most likely says, “The relationship between us and the ranks of the department department at FSB.”
The presence of the consistent Sterin was an important contribution to the effectiveness of Trickbot and Conti – as the entity’s ability to maintain strong operational security and survival was hidden.
Jarvis of Sophos said, “I have no ideas about the chain of transmission, as I have never heard a convincing story about the identity of Stern from anyone before this announcement.”
https://media.wired.com/photos/6838c399f896a4bb0683d874/191:100/w_1280,c_limit/trickbot-ransomware-sec-142009832.jpg
Source link