therecord.media Open in urlscan Pro
2606:4700:4400::ac40:9b4b  Public Scan

URL: https://therecord.media/russian-trickbot-malware-developer-pleads-guilty
Submission: On December 05 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept

 * Leadership
 * Cybercrime
 * Nation-state
 * Elections
 * Technology

 * Cyber Daily®
 * Click Here Podcast

Go
Subscribe to The Record
✉️ Free Newsletter

Image: Wesley Tingey via Unsplash+
Daryna Antoniuk
December 1st, 2023
 * Briefs
 * Cybercrime
 * Malware

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


RUSSIAN DEVELOPER OF TRICKBOT MALWARE PLEADS GUILTY, FACES 35-YEAR SENTENCE

A Russian national pleaded guilty in federal court in Cleveland on Thursday to
charges related to his involvement in developing and deploying the malicious
software known as Trickbot. He faces a maximum penalty of 35 years, the U.S.
Department of Justice said.

According to court documents, Vladimir Dunaev, 40, was a member of a
cybercriminal organization that deployed Trickbot to steal money and install
ransomware on victims’ computers. The group's victims — including hospitals,
schools, and businesses in the U.S. — suffered tens of millions of dollars in
losses.

Trickbot, which was taken down last year, is believed to have stolen more than
$180 million worldwide. Dunaev was extradited from South Korea to the U.S. in
2021.

Dunaev was actively involved in Trickbot’s operation, the DOJ said. In
particular, he created browser modifications and malicious tools to harvest
credentials and mine data from infected computers. He also improved remote
access for Trickbot actors and developed a code to evade detection by legitimate
security software.

“Dunaev and his codefendants hid behind their keyboards, first to create
Trickbot, then using it to infect millions of computers worldwide… invading
privacy and causing untold disruption and financial damage,” DOJ statement said.

Ten victims in the Northern District of Ohio, including Avon schools and a North
Canton real-estate company, were defrauded of more than $3.4 million via
ransomware deployed by Trickbot while Dunaev was involved in the operation,
prosecutors said.

In June, one of Dunaev’s co-conspirators, Alla Witte — a Trickbot malware
developer and Latvian national — pleaded guilty and was sentenced to two years
and eight months in prison.

In February and September, the U.S. and U.K. also issued financial sanctions on
18 other members of Trickbot, freezing their assets and imposing travel bans.

The individuals targeted by the sanctions “include key actors involved in
management and procurement for the Trickbot group, which has ties to Russian
intelligence services,” according to the U.S. Treasury.

 * 
 * 
 * 
 * 
 * 

Tags
 * Trickbot
 * Department of Justice
 * Russia

Previous articleNext article
Ukraine appoints new cyber chief following ouster of top officials
US sanctions North Korean ‘Kimsuky’ hackers after surveillance satellite launch


DARYNA ANTONIUK



Daryna Antoniuk is a freelance reporter for Recorded Future News based in
Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe
and the state of the cyberwar between Ukraine and Russia. She previously was a
tech reporter for Forbes Ukraine. Her work has also been published at Sifted,
The Kyiv Independent and The Kyiv Post.

 * Microsoft warns of Cactus ransomware actors using malvertising to infect
   victimsDecember 5th, 2023
 * Hershey warns of data breach following phishing attackDecember 5th, 2023
 * UK sets out how pornographic websites must verify users’ agesDecember 5th,
   2023
 * Military cyber advocacy group taps first president to harness growing ‘hive
   mind’December 4th, 2023
 * iPhones and Macs get patches for two vulnerabilities December 1st, 2023
 * Russian developer of Trickbot malware pleads guilty, faces 35-year
   sentenceDecember 1st, 2023
 * Ukraine appoints new cyber chief following ouster of top officialsDecember
   1st, 2023
 * Latest severe Chrome bug prompts CISA warningNovember 30th, 2023
 * Suspected China-based hackers target Uzbekistan gov’t and South Koreans,
   Cisco saysNovember 30th, 2023


OBFUSCATION AND AI CONTENT IN THE RUSSIAN INFLUENCE NETWORK “DOPPELGÄNGER”
SIGNALS EVOLVING TACTICS


Obfuscation and AI Content in the Russian Influence Network “Doppelgänger”
Signals Evolving Tactics


CRYPTO COUNTRY: NORTH KOREA’S TARGETING OF CRYPTOCURRENCY


Crypto Country: North Korea’s Targeting of Cryptocurrency


AS BLACK FRIDAY APPROACHES, 3 KEY TRENDS OFFER INSIGHTS FOR MITIGATING ONLINE
SHOPPING SCAMS


As Black Friday Approaches, 3 Key Trends Offer Insights for Mitigating Online
Shopping Scams


IMPROVING AUTOMATION AND ACCESSIBILITY DRIVE $100 BILLION IN PROJECTED AD FRAUD
LOSSES


Improving Automation and Accessibility Drive $100 Billion in Projected Ad Fraud
Losses


CHARTING CHINA’S CLIMB AS A LEADING GLOBAL CYBER POWER


Charting China’s Climb as a Leading Global Cyber Power
 * 
 * 
 * 
 * 

 * Privacy
 * About
 * Contact Us

© Copyright 2023 | The Record from Recorded Future News