www.trustwave.com Open in urlscan Pro
52.151.96.240  Public Scan

URL: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/law-enforcement-collaboration-has-eastern-european-cybercr...
Submission: On December 09 via api from US — Scanned from GB

Form analysis 4 forms found in the DOM

<form><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

GET /en-us/search/

<form method="get" target="_self" action="/en-us/search/">
  <div class="mb-7">
    <input type="text" class="form-control" id="q" name="q" placeholder="Search trustwave.com">
  </div>
</form>

GET https://www2.trustwave.com/Subscription-Center-Subscribe.html

<form method="get" target="_blank" action="https://www2.trustwave.com/Subscription-Center-Subscribe.html">
  <div class="row g-7">
    <div class="col-md-6 col-lg-7">
      <input type="text" class="form-control" name="Email" placeholder="Email Address">
    </div>
    <div class="col-md-6 col-lg-5">
      <button class="btn btn-primary w-100" type="submit">Subscribe</button>
    </div>
  </div>
</form>

<form></form>

Text Content

Cookie Notice

We use cookies to provide you a relevant user experience, analyze our traffic,
and provide social media features. Privacy Policy


Close
GOT IT


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance Cookies

 * Functional Cookies

 * Targeting Cookies

 * Privacy Policy

Privacy Preference Centre

Active

Always Active



Save Settings

Allow All

 * Services
   Services
    * 
      Managed Detection & Response Eradicate cyberthreats with world-class intel
      and expertise
    * 
      Managed Security Services Expand your team’s capabilities and strengthen
      your security posture
    * 
      Consulting & Professional Services Tap into our global team of tenured
      cybersecurity specialists
    * 
      Penetration Testing Subscription- or project-based testing, delivered by
      global experts
    * 
      Database Security Get ahead of database risk, protect data and exceed
      compliance requirements
    * 
      Email Security Catch email threats others miss and prevent data loss
   
   View All Trustwave Services
 * Solutions
   Solutions
   
   BY INDUSTRY
   
    * Education
    * Financial Sector
    * Government
    * Healthcare
    * Hotels
    * Legal
    * Payment Services
    * Restaurants
    * Retail
   
   BY REGULATION
   
    * Data Privacy
    * CMMC
    * FISMA
    * GDPR
    * GLBA
    * HIPAA
    * ISO
    * PCI
    * SOX
   
   BY TOPIC
   
    * Microsoft Exchange Server Attacks Stay protected against emerging threats
    * Rapidly Secure New Environments Security for rapid response situations
    * Securing the Cloud Safely navigate and stay protected
    * Securing the IoT Landscape Test, monitor and secure network objects

 * Why Trustwave
   Why Trustwave
    * The Trustwave Approach A focus on threat detection and response
    * Trustwave SpiderLabs Team Researchers, ethical hackers and responders
    * Trustwave Fusion Platform Unprecedented security visibility and control
    * SpiderLabs Fusion Center Our cybersecurity command center
    * Security Operations Centers Distributed worldwide defense nodes

 * Partners
   Partners
    * Technology Alliance Partners Key alliances who align and support our
      ecosystem of security offerings
   
    * Trustwave PartnerOne Program Join forces with Trustwave to protect against
      the most advance cybersecurity threats
    * Register
      Login

 * Resources
   Resources
   
   BLOGS
   
    * Trustwave Blog
    * SpiderLabs Blog
   
   UPCOMING
   
    * Webinars
    * Events
   
   MEDIA & ASSETS
   
    * Document Library
    * Video Library
    * Analyst Reports
    * Webinar Replays
    * Case Studies
    * Trials & Evaluations
   
   NOTICES
   
    * Security Advisories
    * Software Updates
   
   HELP
   
    * Contact
    * Support

 * Login
   Login
   Fusion Platform Login
   What is the Trustwave Fusion Platform?
    * MailMarshal SEG Login
    * Legacy TrustKeeper Login

 * Incident Response
   Incident Response
   
   EXPERIENCING A SECURITY BREACH?
   
   Get access to immediate incident response assistance.
   
   24 HOUR HOTLINES
   
    * AMERICAS
      
      +1 855 438 4305
   
    * EMEA
      
      +44 8081687370
   
    * AUSTRALIA
      
      +61 1300901211
   
    * SINGAPORE
      
      +65 68175019
   
   Recommended Actions

Loading...

BLOGS & STORIES


SPIDERLABS BLOG

Attracting more than a half-million annual readers, this is the security
community's go-to destination for technical breakdowns of the latest threats,
critical vulnerability disclosures and cutting-edge research.


LAW ENFORCEMENT COLLABORATION HAS EASTERN-EUROPEAN CYBERCRIMINALS QUESTIONING
WHETHER THERE IS A SAFE HAVEN ANYMORE

access_timeDecember 08, 2021
person_outlineTrustwave SpiderLabs
share
 * 
 * 
 * 

Through the active Dark Web research that Trustwave SpiderLabs conducts for its
clients, we have observed new communications on various Dark Web forums between
Eastern-European cybercriminals.

Based on the conversations that we’ve collected, a segment of cybercriminals is
now worried that the Russian authorities may be actively hunting them down. One
of the forum members on the Dark Web even went as far as to state that they
believed there were “recent secret negotiations on cybercrime between the
Russian Federation and the United States.”



Все решается втихаря, в кабинетах.

А кто какие игры ведет в закулисье ..- бессмысленно гадать. Мы не знаем (всего).

Кстати, вот - недавние  тайные переговоры о киберпреступности РФ и США тому
пример."



Everything is decided on the sly, in the offices.

And who and which game is actually playing in the backstage ..- it is pointless
to guess. We don't know (everything).

Incidentally, there are the recent secret negotiations on cybercrime between the
Russian Federation and the United States. "

10 Nov 2021, 10:09 PM, Forum: Exploit



Other cybercriminals, however, are still living large, according to recent news.
A REvil hacker wanted by the FBI for ransomware and money laundering activities,
Yevgyeniy Igoryevich Polyani, was seen in Barnaul driving a $74,000 Toyota Land
Cruiser and owns a BMW worth up to $108,000.


HACKERS HAVE PICKED UP ON CURRENT EVENTS

Back on June 16, 2021, U.S. President Joe Biden met with Russian President
Vladimir Putin in Geneva, Switzerland. Part of their conversation was reportedly
the growing number of ransomware attacks on U.S. companies and critical
infrastructure.

After Biden publicly stated he expected to see results from his conversations on
ransomware with Putin in June, forum threads dedicated to recent arrests almost
immediately began focusing on potential takedowns, and later, the possibility of
one of their own cooperating with law enforcement.

Just months prior, these forum members would joke about being caught and
arrested. But now, these same forum members are discussing how to prepare
themselves for the possibility of being captured or potential sentences for
crimes. Others, meanwhile, refuse to be scared.



“никто рансомварщиков в ру не будет закрывать, максимум попросят быть тише и
делиться не нагоняй жути”

“no one will put to the jail the ransomware gang members in RU, maximum you will
be asked to be quieter and to share, do not be scared “

17 June 2021, 7:41 AM, Forum: h0st 

     
 --------------------------------------------------------------------------------

В политике часто личности становятся разменной монетой (от древнего Рима). Нет
никаких гарантий, что 272 ст.УК РФ  никогда  не будет применена из-за чернухи к
тем, кто работает по юсе.

и да, ВВП не вечен. Кто придет на смену и какие будут внешнеполитические
договоренности, отношения, да и внутренние акценты в правоприменительной
практике, никто не знает.”



In politics, individuals often become a bargaining chip (from ancient Rome).
There are no guarantees that Article 272 of the Criminal Code of the Russian
Federation will never be applied because of the criminal operations to those who
work in the US.

and yes, Putin is not eternal. Who will replace and what will be the foreign
policy agreements, relations, and the internal accents in law enforcement
practice, no one knows.”

8 Nov 2021, 9:39 PM, Forum: Exploit

 --------------------------------------------------------------------------------

Весь вопрос в том, к чему вы готовы, если начнется охота. За вами.

Вот мне на днях отвели два месяца жизни - и это на самом деле несерьезно.
Ресурсов не хватит, у того кто угрожал.

Но призадумалась.... а если бы серьезно?

Отсюда и вопрос - кто что делать будет, если из уютной норы начнут тянуть?”

 

The whole question is, what are you ready for if the hunt begins on you.

So the other day I was given two months of life - and this is actually not
serious. The resources won't be enough, the one who threatened.

But it makes me wonder .... and if it were serious?

Hence the question - who will do what if they start pulling from a cozy hole?”

9 Nov 2021, 5:16 AM, Forum: Exploit


On July 2, shortly after the June meeting between Biden and Putin, the Kaseya
VSA attacks occurred – a mass-scale ransomware campaign that was attributed to
Russia-based cybergang REvil.

On July 9, Biden pressed Putin on a phone call about the attacks again.

“I made it very clear to [Putin] that the United States expects, when a
ransomware operation is coming from their soil even though it’s not, not,
sponsored by the state, that we expect them to act,” said Biden.

On July 13, the REvil gang began to disappear from the Internet (before briefly
reappearing and then seemingly shut down in October), and more arrests were made
due to the collaboration between several law enforcement agencies
internationally.


DARK WEB FORUMS SHINE A LIGHT ON THE MINDS OF CYBERCRIMINALS

Dark Web forums are very much a window into the soul of the cybercriminal
community, and it is the place threat actors can create a society.

By regularly monitoring the Dark Web, security professionals can gain valuable
insights into emerging trends and specific threat intelligence to improve their
defensive techniques. They can leverage chatter on Dark Web forums as an early
warning system, alerting them to new bots, viruses or malware that have appeared
on the scene. Monitoring the Dark Web can provide early notification of an
attack on a specific organization(s) too. Chatter on the Dark Web mentioning
some form of access or the sale of credentials, names of executives and other
information that is specific to an organization can be a giveaway you’re under
attack or are being highly targeted.

This early warning gives security professionals time to harden their defenses
and update their response playbooks, enabling them to mitigate the risk of the
threat being used against their organization or respond more quickly if an
attack does occur. If they see a discussion of a new social engineering
technique or phishing lure, they can proactively update their email security
settings and warn employees to be on the lookout.

A wide variety of activities take place in these extremely active Dark Web
forums. The topics cover everything from discussing rumors and gossip – to
selling malware or commercial secrets, data stolen by ransomware attacks, hiring
developers to write a new malware, and recruiting. The chat rooms are also a
place where those looking to break into the underground can find work and build
their reputation amongst local gangs.

Other activities include posting translations of publications, including press
reports on ransomware arrests and activity. There are even news sites for
cybercriminals – with information on the latest occurrences and other
information that may be useful for threat actors. If you are new to the
cybercriminal world, you can study the field you’re interested in joining and
possibly get brought in to start doing some entry-level criminal activity.


THE NEXT MOVE FOR ORGANIZED CYBERCRIMINALS

Eastern-European ransomware operators are increasingly trapped. It appears they
may no longer be entirely safe in their own country, and they cannot physically
pick up their operations and move to another location with extradition treaty
agreements in place with other countries.  

In just the last few months, we have seen some results of geopolitical
collaboration efforts. Getting a handle on ransomware and bringing
cybercriminals to justice seems to be becoming a global priority. And this
should scare threat actors.

We will likely see groups toggle ‘offline’ and ‘online’ – as we’ve seen with
REvil before – in order to cover their tracks when law enforcement gets too
close. We may also see some gangs go dark and close their business, and other
groups emerging to pick their share.

We anticipate that these organized gangs will likely physically stay put in
their home countries because even though it is not as ‘safe’ as it once was for
cybercrime, cyber gang members are still less likely to be caught on their ‘home
turf’.  Many of these cybercriminals want to stay where they belong, where their
families and friends reside, and where the local language is familiar, and many
of their contacts exist.

Also, the corruption in many Eastern European countries means cybercriminals
have a better chance of escaping even if they do get into trouble.


WHAT ORGANIZATIONS CAN DO TO DEFEND AGAINST TARGETED RANSOMWARE ATTACKS

Ransomware will not stop. We do not expect a decline in ransomware attacks
because the rewards are too great for those involved. Organizations of all sizes
need to be prepared – but especially those in manufacturing, critical
infrastructure, finance and healthcare. These types of organizations hold
sensitive data and are seen as more willing to pay a ransom due to the vital
services they provide.

Having a strong cybersecurity posture across your various networks and
infrastructures by ensuring your organization executes best security practices
is critical to avoid becoming a ransomware gang victim. Here’s a short list of
actions that we recommend all organizations follow to ensure they are prepared
for targeted ransomware attacks.

 * Run supported versions of software
 * Always patch and do it quickly
 * Maintain regular air-gapped backups. Practice restores from these backups
 * Use effective security email gateways and endpoint protection
 * Enforce strong password policy and use multi-factor authentication (MFA)
 * Deploy network and data segmentation
 * Pen-test your environment and minimize access rights (e.g. RDP)
 * Use Dark Web monitoring of your assets (domains, executive names, etc.)
 * Have a plan for a ransomware attack
 * Refrain from paying ransoms


RELATED SPIDERLABS BLOGS

2 weeks ago

MODSECURITY DOS VULNERABILITY IN JSON PARSING (CVE-2021-42717)

SpiderLabs Blog

1 month ago

CRYPKEY LICENSE SERVICE ALLOWS PRIVILEGE ESCALATION

SpiderLabs Blog

1 month ago

BLACKBYTE RANSOMWARE – PT. 1 IN-DEPTH ANALYSIS

SpiderLabs Blog

 * About
 * Contact
 * Support
 * Careers
 * News Releases




STAY INFORMED

Sign up to receive the latest security news and trends from Trustwave.

Subscribe

SERVICES

 * Managed Detection & Response
 * Managed Security Services
 * Consulting & Professional Services
 * Penetration Testing
 * Database Security
 * Email Security
 * All Services

WHY TRUSTWAVE

 * The Trustwave Approach
 * Trustwave SpiderLabs
 * SpiderLabs Fusion Center
 * Trustwave Fusion Platform
 * Securing Operation Centers

PARTNERS

 * Global Technology Partners
 * PartnerOne Program
 * Become a Partner
 * PartnerOne Portal Login

COMPANY

 * Leadership Team
 * Our History
 * Awards & Accolades
 * Global Locations
 * Careers
 * Media Coverage
 * News Releases

SOLUTIONS BY TOPIC

 * Microsoft Exchange Server Attacks
 * Securing the Cloud
 * Rapidly Securing New Environments
 * Securing the IoT Landscape

SOLUTIONS BY INDUSTRY

 * Education
 * Financial Sector
 * Government
 * Healthcare
 * Hotels
 * Legal
 * Payment Services
 * Restaurants
 * Retail

SOLUTIONS BY REGULATION

 * Data Privacy
 * CMMC
 * FISMA
 * GDPR
 * GLBA
 * HIPAA
 * ISO
 * PCI
 * SOX

BLOGS

 * Trustwave Blog
 * SpiderLabs Blog

UPCOMING

 * Webinars
 * Events

MEDIA & ASSETS

 * Document Library
 * Video Library
 * Analyst Reports
 * Webinar Replays
 * Case Studies
 * Trials & Evaluations

NOTICES

 * Security Advisories
 * Software Updates

HELP

 * Contact
 * Support

English German (Deutsche) Japanese (日本語)

 * Legal
 * Terms of Use
 * Privacy Policy

Copyright © 2021 Trustwave Holdings, Inc. All rights reserved.

Loading



HELP US STOP THE ROBOT UPRISING

This is a bot-free zone. Please check the box to let us know you're human.




THANK YOU

Download Now

--------------------------------------------------------------------------------

Read complimentary reports and insightful stories in the
Trustwave Resource Center


THANK YOU

One of our sales specialists will be in touch shortly.

--------------------------------------------------------------------------------

Read complimentary reports and insightful stories in the
Trustwave Resource Center