therecord.media Open in urlscan Pro
2606:4700::6812:1d78  Public Scan

URL: https://therecord.media/scareware-developer-arrested-in-spain
Submission: On July 18 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept

 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe

Image: Comfortable_Ad3150 via Reddit
Daryna AntoniukJuly 17th, 2023
 * Briefs
 * Cybercrime

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


ALLEGED UKRAINIAN SCAREWARE DEVELOPER ARRESTED AFTER A DECADE ON THE RUN

Spanish police have arrested a Ukrainian hacker who has been hiding from
international authorities for over a decade.

The Ukrainian national, whose identity has not been disclosed by the police, was
wanted globally for their alleged participation in a scareware operation that
took place from 2006 until 2011.

Scareware is a type of malicious software or deceptive tactic that tricks users
by warning of false security threats. It aims to scare people into buying fake
security software or sharing sensitive information with attackers.

The operation affected hundreds of thousands of victims worldwide and inflicted
more than $70 million in economic damage.

Spanish authorities apprehended the suspect at Barcelona-El Prat airport last
Tuesday after learning of his intended flight to Barcelona. The operation was
supported by the FBI and Interpol.

After the arrest, he was immediately taken into custody due to the seriousness
of the charges against him.

The press release from Spanish law enforcement did not offer much information
about the detainee and their activities, but the arrest appears connected to the
Trident Tribunal operation.

In 2011, the FBI and law enforcement in 11 other countries disrupted two
international cybercriminal operations that sold fake anti-virus software.

The hackers tried to convince people to pay $129 to "clean" their computers of
supposed viruses. The reality was that the antivirus software was
non-functional, and the reported infections it claimed to identify were
non-existent.

An estimated 960,000 users were victimized by this scareware scheme, leading to
$72 million in actual losses, according to the press release by the FBI.

Hackers from at least 12 countries were involved in this scheme, including
Ukraine, Latvia, Germany, Netherlands, France, Lithuania and the U.S. In 2011,
the first year of the operation, two people were arrested.

At the time of the publication, Spanish police hadn't responded to The Record’s
request for comment.

 * 
 * 
 * 
 * 
 * 

Tags
 * Ukraine
 * scareware


DARYNA ANTONIUK



Daryna Antoniuk is a freelance reporter for Recorded Future News based in
Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe
and the state of the cyberwar between Ukraine and Russia. She previously was a
tech reporter for Forbes Ukraine. Her work has also been published at Sifted,
The Kyiv Independent and The Kyiv Post.

Previous article
TJ Maxx, Shutterfly, TomTom latest organizations to confirm MOVEit breaches
No new articles

 * Alleged Ukrainian scareware developer arrested after a decade on the runJuly
   17th, 2023
 * By criminals, for criminals: AI tool easily generates ‘remarkably persuasive’
   fraud emails July 17th, 2023
 * Honeywell, CISA warn of ‘Crit.IX’ vulnerabilities affecting manufacturing
   toolsJuly 14th, 2023
 * Hackers target Pakistani government, bank and telecom provider with
   China-made malwareJuly 14th, 2023
 * Belarus-linked hacks on Ukraine, Poland began at least a year ago, report
   saysJuly 13th, 2023
 * Norwegian Refugee Council hit by cyberattackJuly 13th, 2023
 * Delaware county struggling to respond to cyberattackJuly 12th, 2023
 * Silk Road drug market’s ‘mentor’ sentenced to 20 years in prisonJuly 11th,
   2023
 * Bangladesh government fixes website that leaked personal data of 50 million
   citizensJuly 11th, 2023


PUTIN’S POTENTIAL SUCCESSORS PART 2: ALEKSEY DYUMIN


Putin’s Potential Successors Part 2: Aleksey Dyumin


CHINA'S TARGETING OF INTERNATIONAL COMPANIES IN GEOPOLITICAL COMPETITION


China's Targeting of International Companies in Geopolitical Competition


THE ESCALATING GLOBAL RISK ENVIRONMENT FOR SUBMARINE CABLES


The Escalating Global Risk Environment for Submarine Cables


NORTH KOREA’S CYBER STRATEGY


North Korea’s Cyber Strategy


BLUEDELTA EXPLOITS UKRAINIAN GOVERNMENT ROUNDCUBE MAIL SERVERS TO SUPPORT
ESPIONAGE ACTIVITIES


BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support
Espionage Activities
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News