Article Details

Scrape Timestamp (UTC): 2024-01-26 00:00:49.095

Source: https://www.theregister.com/2024/01/25/trickbot_malware_dev_sentenced/

Original Article Text

Click to Toggle View

Trickbot malware scumbag gets five years for infecting hospitals, businesses. Rest of the crew still at large. A former Trickbot developer has been sent down for five years and four months for his role in infecting American hospitals and businesses with ransomware and other malware, costing victims tens of millions of dollars in losses. Vladimir Dunaev, of Amur Oblast in Russia, was sentenced in the US yesterday after pleading guilty on November 30 to two counts: conspiracy to commit computer fraud, and conspiracy to commit wire fraud. Trickbot initially infected PCs to steal people's login details to their online bank accounts, so that funds could be siphoned. Over the years it transformed into an expandable malware-as-a-service that crooks could rent and use against targets, and gained various abilities, such as providing backdoors, stealing credentials and data, deploying ransomware, and more. Between June 2016 and June 2021, Dunaev worked as a developer for the criminal gang, providing "specialized services and technical abilities," according to his plea agreement [PDF]. These special skills included recruiting other coders, buying and managing servers used to deploy and operate the Windows nasty Trickbot, encrypting the malware to avoid detection by security software, spamming and phishing potential victims, and then laundering stolen funds. He also added support for stealing information out of victims' browsers, such as their online account credentials. "For instance, Dunaev developed browser modifications for several widely used open-source browsers, such as FireFox and Chrome, using open-source codebases for each browser called FireFox Nightly and Chromium," the court documents say. "These modifications facilitated and enhanced the remote access obtained by Trickbot by allowing actors to steal passwords, credentials, and other stored information." Dunaev also confessed to writing code used to steal secrets from infected computers. Between October 2018 and February 2021 alone, the crew defrauded victims out of more than $3.4 million, the court documents claim.   According to the UK National Crime Agency, the gang has extorted at least $180 million (£145 million) from people and organizations worldwide. In 2021, Dunaev was extradited to America from South Korea. The original indictment charged Dunaev and six others for their alleged roles in developing, deploying, managing and profiting from Trickbot. In June, one of the six suspects — Trickbot malware admin Alla Witte — pleaded guilty to conspiracy to commit computer fraud and was sentenced to two years and eight months in prison. Trickbot, which started as a banking Trojan and added functionality over the years, was also used as an initial intrusion vector for ransomware variants and even helped Emotet come back from the dead after that botnet's law-enforcement takedown. Trickbot shut down in 2022, but by then many of its malware developers have moved on to other criminal operations. In early 2023, the US and UK sanctioned seven Russians for their alleged roles in disseminating Conti and Ryuk ransomware along with the Trickbot banking trojan. Later that year, both governments added 11 more alleged Trickbot gang members to the list.

Daily Brief Summary

MALWARE // Trickbot Developer Imprisoned, Gang Cost Victims Millions

Vladimir Dunaev, a former Trickbot malware developer, was sentenced to over five years in prison for his involvement in cybercrimes.

Dunaev's activities included creating infections to steal banking credentials and facilitate further malware attacks against US hospitals and businesses.

His offenses caused substantial financial damage, with tens of millions of dollars in losses reported by victims.

The Trickbot gang has extorted at least $180 million from global organizations according to the UK National Crime Agency.

Dunaev's role extended from writing malicious code and browser modifications to laundering the proceeds of the cybercriminal operation.

One of Dunaev’s cohorts, Alla Witte, has already been sentenced as the US continues its crackdown on international cybercriminals.

Trickbot started as a banking trojan but evolved into a comprehensive malware-as-a-service operation before being shut down in 2022.

The US and UK have sanctioned several individuals associated with distributing various ransomware and the Trickbot trojan.