therecord.media
Open in
urlscan Pro
2606:4700::6812:1d78
Public Scan
URL:
https://therecord.media/scareware-developer-arrested-in-spain
Submission: On July 18 via api from TR — Scanned from DE
Submission: On July 18 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * People * Technology * Mobile App * About * Podcast * Contact Go SUBSCRIBE TO THE RECORD Subscribe Image: Comfortable_Ad3150 via Reddit Daryna AntoniukJuly 17th, 2023 * Briefs * Cybercrime * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. ALLEGED UKRAINIAN SCAREWARE DEVELOPER ARRESTED AFTER A DECADE ON THE RUN Spanish police have arrested a Ukrainian hacker who has been hiding from international authorities for over a decade. The Ukrainian national, whose identity has not been disclosed by the police, was wanted globally for their alleged participation in a scareware operation that took place from 2006 until 2011. Scareware is a type of malicious software or deceptive tactic that tricks users by warning of false security threats. It aims to scare people into buying fake security software or sharing sensitive information with attackers. The operation affected hundreds of thousands of victims worldwide and inflicted more than $70 million in economic damage. Spanish authorities apprehended the suspect at Barcelona-El Prat airport last Tuesday after learning of his intended flight to Barcelona. The operation was supported by the FBI and Interpol. After the arrest, he was immediately taken into custody due to the seriousness of the charges against him. The press release from Spanish law enforcement did not offer much information about the detainee and their activities, but the arrest appears connected to the Trident Tribunal operation. In 2011, the FBI and law enforcement in 11 other countries disrupted two international cybercriminal operations that sold fake anti-virus software. The hackers tried to convince people to pay $129 to "clean" their computers of supposed viruses. The reality was that the antivirus software was non-functional, and the reported infections it claimed to identify were non-existent. An estimated 960,000 users were victimized by this scareware scheme, leading to $72 million in actual losses, according to the press release by the FBI. Hackers from at least 12 countries were involved in this scheme, including Ukraine, Latvia, Germany, Netherlands, France, Lithuania and the U.S. In 2011, the first year of the operation, two people were arrested. At the time of the publication, Spanish police hadn't responded to The Record’s request for comment. * * * * * Tags * Ukraine * scareware DARYNA ANTONIUK Daryna Antoniuk is a freelance reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post. Previous article TJ Maxx, Shutterfly, TomTom latest organizations to confirm MOVEit breaches No new articles * Alleged Ukrainian scareware developer arrested after a decade on the runJuly 17th, 2023 * By criminals, for criminals: AI tool easily generates ‘remarkably persuasive’ fraud emails July 17th, 2023 * Honeywell, CISA warn of ‘Crit.IX’ vulnerabilities affecting manufacturing toolsJuly 14th, 2023 * Hackers target Pakistani government, bank and telecom provider with China-made malwareJuly 14th, 2023 * Belarus-linked hacks on Ukraine, Poland began at least a year ago, report saysJuly 13th, 2023 * Norwegian Refugee Council hit by cyberattackJuly 13th, 2023 * Delaware county struggling to respond to cyberattackJuly 12th, 2023 * Silk Road drug market’s ‘mentor’ sentenced to 20 years in prisonJuly 11th, 2023 * Bangladesh government fixes website that leaked personal data of 50 million citizensJuly 11th, 2023 PUTIN’S POTENTIAL SUCCESSORS PART 2: ALEKSEY DYUMIN Putin’s Potential Successors Part 2: Aleksey Dyumin CHINA'S TARGETING OF INTERNATIONAL COMPANIES IN GEOPOLITICAL COMPETITION China's Targeting of International Companies in Geopolitical Competition THE ESCALATING GLOBAL RISK ENVIRONMENT FOR SUBMARINE CABLES The Escalating Global Risk Environment for Submarine Cables NORTH KOREA’S CYBER STRATEGY North Korea’s Cyber Strategy BLUEDELTA EXPLOITS UKRAINIAN GOVERNMENT ROUNDCUBE MAIL SERVERS TO SUPPORT ESPIONAGE ACTIVITIES BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities * * * * * Privacy Policy © Copyright 2023 | The Record from Recorded Future News