Tag Archive for: Netherlands’

Alleged Russian ransomware attacker indicted, faces extradition from the Netherlands


The U.S. Department of Justice (DOJ) has secured the extradition of Denis Mihaqlovic Dubnikov, a Russian citizen from the Netherlands. He will face trial in the United States on allegations of participating in money laundering for a ransomware group.

In a press release, the DOJ accused the 29-year-old of laundering as much as $400,000 that was proceeds from the victims of ransomware attacks. Overall, Dubnikov and his co-conspirators, who are yet to be identified, laundered as much as $70 million extracted using the Ryuk malware variant.

“After receiving ransom payments, Ryuk actors, Dubnikov and his co-conspirators, and others involved in the scheme, allegedly engaged in various financial transactions, including international financial transactions, to conceal the nature, source, location, ownership, and control of the ransom proceeds,” the release said.

The Ryuk malware variant was first identified in 2018. The malware operates by encrypting files and attempting to delete any system backups when it is executed on a computer or network. It targets both storage drives connected to or in the computer and those accessed remotely via networks.

The attacks targeted individuals and organizations throughout the United States and abroad. Victims were blackmailed into paying ransoms in digital assets to access their files.

One high-profile victim was the U.S. Coast Guard, which saw its operations stopped for over 30 hours following an attack perpetuated through an email phishing campaign in 2020. In the same year, the U.S. classified the malware variant as an “imminent and increasing cybercrime threat to hospitals.”

Earlier this year, the U.S. Department of State linked the ransomware to Conti, a Russian ransomware group. The department has promised a $15 million bounty for information on the group. Ryuk ransomware has also been linked to the North Korean Lazarus group.

US cracking down hard on digital assets money laundering

Dubnikov has already made his first appearance in a court in Portland. A five-day jury trial will be held for him starting on October 4, and he could face up to 20 years imprisonment if found guilty.

The DOJ’s investigation of the case was coordinated…

Source…

Android Malware Named TeaBot Banking Trojan Targets Sixty Banks in Germany, Spain, Italy, Belgium, and the Netherlands


Cleafy security researchers discovered a new banking trojan targeting banks in Europe. They named the new Android malware variant “TeaBot” because it is not related to other banking trojans.

The Android malware abuses Android’s Accessibility Services to overlay legitimate banking apps, intercept user actions and two-factor authentication codes, and perform arbitrary actions.

Cleafy’s Threat Intelligence and Incident Response team discovered the malware in January 2021. By March 29, the researchers detected malicious injections against Italian banks, and Belgium and Netherlands banks by May 2021.

TeaBot Android malware can stream a device’s screen and mimic user interaction

The researchers explained that the primary goal of TeaBot is stealing victims’ banking credentials for fraudulent purposes by abusing Android’s Accessibility Services.

The Android malware achieves a real-time interaction with the compromised device to bypass “new device enrollment” and perform an Account Takeover (ATO).

When TeaBot is successfully installed in the victim’s device, attackers can obtain a live stream of the device screen on demand and also interact with it.

The banking trojan can also send, intercept, and hide SMS messages to bypass two-factor authentication.

Like other Android banking trojans such as Anubis, Cerberus/Alien it overlays banks’ mobile applications to steal login and credit card information. It also observes and intercepts user actions and can perform arbitrary actions.

Unlike other banking trojans like EventBot that observe all installed apps, TeaBot only spied on selected banking applications. Consequently, it downloads specific payloads to perform overlay attacks against specific banks.

“TeaBot, during its first communications with the C2, sends the list of installed apps to verify if the infected devices had one or more targeted apps already installed,” the researchers noted.

Cleafy researchers also discovered that the Android malware sent user interaction information for specific bank apps every ten seconds to the command server. This strategy ensured that there is little traffic between the Android malware and the…

Source…

Global Embedded Secure Element Market (2021) to Witness Huge Growth by 2026 | NXP Semiconductors (Netherlands), Infineon (Germany), STMicroelectronics (Switzerland), Gemalto (Netherlands), IDEMIA (France) – KSU


A recent research study on the global Embedded Secure Element market presented by Zeal Insider offers a detailed analysis of key market players, market revenue, market segments, share, and geographic regions. It also offers several industry trends and predictions for upcoming Eight years. The report also puts light on the current COVID-19 pandemic situations on the Global Embedded Secure Element Market enabling the user to propose strategic growth plans and tactical business judgments. The size of global Embedded Secure Element market is estimated to grow during the forecast period of 2020 to 2028 with a CAGR of xx% and is estimated to reach.US$ xx million by 2028, from US$ xx million in 2020.

Checkout Free Report Sample of Embedded Secure Element Market Report for Better Understanding: https://www.zealinsider.com/report/170368/embedded-secure-element-market#sample

License Type Discounted Price
Single User $2300 (Buy Now)
Multi User $2300 (Buy Now)
Corporate User $2300 (Buy Now)

COVID-19 Impact

The report explains the degree of COVID-19 impact on every segment under the scope of the report with its trend over the forecast period. COVID-19 pandemic situations have led to a significant slowing down in the production and manufacturing of various sectors. Strict lockdowns imposed by several governments have led to a temporary shutdown of small as well as major market players. The report study offers a useful insight that explains the impact of government policies, import & export control, disruption of the supply chain, distribution network, and halts on production activities on overall revenue generation. Also, it helps clients to make strategic decisions to overcome these pandemic conditions.

Manufacturers Information

The Embedded Secure Element report focuses on the major players operating in the global Embedded Secure Element market to study their market share, net sale, business strategies, top competitors, key business segments, and regional presence. The competitive landscape presented in the report will help clients to focus on the key parameters that will help them to achieve desired targets in the global Embedded Secure Element market.

Leading companies…

Source…

Malaysia data breach: Probe takes in Netherlands, HK

  1. Malaysia data breach: Probe takes in Netherlands, HK  The Straits Times
  2. Trail of leaked telco data leads to the Netherlands, Hong Kong, says police chief  The Malaysian Insight
  3. Full coverage

data breach – Google News