Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (2024)

Anthony Spaelti

Hyperion | Stanford MBA |McKinsey

  • Report this post

The cat-and-mouse game between law enforcement and cybercriminals selling sensitive information continues: BreachForum v2 has been seized.❓ BreachForum:Users were able to purchase hacking software, leaked sensitive data (e.g. the LinkedIn 2021 Leak was also on sale on that site), and services (i.e. paying cybercriminals to engage in illicit activities for you)📕 Origin:The forum started as RaidForums in 2015 until it was seized by law enforcement in 2022. It reopened as BreachForums in 2022 and was seized again in early 2023. It reopened in June 2023 as BreachForums V2 and was seized on May 16, 2024.🙇 Challenge:The timeline illustrates the inherent copycat issue law enforcement faces: While they were able to make arrests in each of the seizures, the forums re-spawned only months afterward.🔜 What's next?On the day of the seizure, a cybercriminal known as "USDoD" already announced the forum's re-opening as "Breach Nation" on July 4th (U.S. Independence Day); likewise, a former moderator of BreachForums also announced creating a "spin-off." This shows how easy it is to re-spawn those self-hosted "websites" on the darknet.💡But...Law enforcement seized the second and third installments of RaidForums at incredible speed, making it likely they found a way to more easily physically locate where these particular servers are in the world, or the server software that is being used has vulnerabilities law enforcement knows how to exploit and corrupt them, or there are insiders who support law enforcement, ... or something else entirely!Either way, I would not be surprised if "USDoD"'s version will not be up for long either!(P.S. Being originally from Zurich I can't help but quickly give a shoutout to Kantonspolizei Zürich for participating in this raid! 🎉)(P.P.S: The image attached is the current splash screen the FBI installed on BreachForums' darknet website. A pretty common practice, see my post here: https://lnkd.in/gVMbRZcR)

  • Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (2)

16

1 Comment

Like Comment

Ben Lazaroff

Helping the 99% unlock their potential | Founder @ TownSquare Chess | Stanford MBA, ex-McKinsey, Chicago Mayor's Office

1w

  • Report this comment

you should start a formal newsletter on this stuff. I'm genuinely interested in these kinds of things and it would be cool to have them all in one place also :)

Like Reply

1Reaction 2Reactions

To view or add a comment, sign in

More Relevant Posts

  • DataGrade

    259 followers

    • Report this post

    Law enforcement takes down LockBit's leak site and infrastructure, seizing control of their operations. Europol releases more information on the months-long operation. #cybersecurity #lawenforcement #LockBit#LockBit3.0, #darkweb, #blog, #404message, #seizurenotice, #InternationalLawEnforcement, #VXUnderground, #FBI, #pwned, #affiliate, #login, #ransomware, #sourcecode, #victims, #moneyextorted, #datastolen, #chats, #flawedinfrastructure, #arrested, #longestrunning, #financiallysuccessful.

    Updating: In “Chronos,” law enforcement took down 34 Lockbit servers https://www.databreaches.net
    Like Comment

    To view or add a comment, sign in

    • Report this post

    ❗ Beware of tech-support pirates! They're targeting our loved ones with alarming claims and manipulation. Learn how to shield your aging parents from falling victim to these virtual threats in our latest blog post. Knowledge is power! 💪📚👉 Don't miss out! Link in the post to dive into this week's blog!📝#lawyer #estateplanning #attorney #legal #LinkedIn

    SHIELDING YOUR PARENTS FROM EVOLVING FINANCIAL SCAMS - PART 2 dynastyfirm.com
    Like Comment

    To view or add a comment, sign in

  • James Beal

    Cyber Threat Intelligence Engineer - Focused on simplifying the evolving threat landscape and creating tangible alerts to help TRIAGE events | Proactive Threat Hunter | Purple Team Enthusiast

    • Report this post

    AeterneusIntel TRIAGE Brief: Monumental news on the law enforcement front this week - LockbitSupp, the ring-leader of the LockBit ransomware group has been called out as a Russian citizen, which has been teased for weeks now! Also one of the top hackers in REvil that was responsible for the Kaseya attack and many others has been given a long term sentence and huge fine!Overview:LockbitSupp: The United States, United Kingdom and Australia on Tuesday alleged that the leader of LockBit is a Russian national called Dmitry Yuryevich Khoroshev who had worked under the pseudonym LockbitSupp.REvil: A Ukrainian hacker has been sentenced to almost 14 years in prison for infecting thousands of victims with REvil ransomware and demanding over $700 million in ransom payments. Yaroslav Vasinskyi, 24, was ordered to pay more than $16 million in restitution for his role in the REvil attacks, according to the statement by the U.S. Department of Justice.Area of Impact: Legal activity has ramped up so far in 2024, keeping informed on the process and impacts on certain threat groups is always a good idea to be able to speak to it for your organizations.TRIAGE: It is great to see another real arrest and conviction being made in the case of the REvil ransomware group, against all the damage they were able to cause for orgs worldwide. The LockBit events have had a long lag time for the reveal of their “leader”. It is another interesting case to track from a security researcher perspective, especially with all the interactions between law enforcement and the threat group themselves, especially tied to LockBitSupp themselves. Hopefully this at least slows down his easy freedom of movement and his loss of full anonymity which he has maintained up to this point.

    • Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (12)

    1

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Dynasty Law, LLC

    64 followers

    • Report this post

    ❗ Beware of tech-support pirates! They're targeting our loved ones with alarming claims and manipulation. Learn how to shield your aging parents from falling victim to these virtual threats in our latest blog post. Knowledge is power! 💪📚👉 Don't miss out! Link in the post to dive into this week's blog!📝#lawyer #estateplanning #attorney #legal #LinkedIn

    SHIELDING YOUR PARENTS FROM EVOLVING FINANCIAL SCAMS - PART 2 dynastyfirm.com
    Like Comment

    To view or add a comment, sign in

  • Ramadji A.

    CISO | CISSP | CISM | CCSP | Cybersecurity leader | Cyber Defense Researcher | Strategist | Digital Transformation Enabler | FOSS Advocate

    • Report this post

    “Facing more than 30 lawsuits from victims of its massive data breach, 23andMe is now deflecting the blame to the victims themselves in an attempt to absolve itself from any responsibility, according to a letter sent to a group of victims seen by TechCrunch.”#23andMe #23andMeDataBreach #DataSecurity #DataPrivacy #InformationSecurity #OwiningUp #Responsibility #DeflectingResponsibility #Lawsuits #DataBreachVictims #ReputationDamage #FinancialDamageshttps://lnkd.in/gUDDggQU

    23andMe tells victims it's their fault that their data was breached | TechCrunch https://techcrunch.com

    2

    Like Comment

    To view or add a comment, sign in

  • The Record from Recorded Future News

    12,576 followers

    • Report this post

    DDoS attack on Pennsylvania court system knocks out filing systems, bail payment site. Why it matters:1. The DDoS attack on Pennsylvania's court system has caused significant service outages. Key legal mechanisms including the web docket system and electronic filing system for attorneys are currently inaccessible, impacting court procedures and services. 2. Notably, no indications of court data being compromised have been observed, yet the limited operations and potential for data loss serve as a stark reminder of the susceptibility of vital public services to cyber threats. 3. This marks another critical instance in an escalating trend of cyber-attacks targeting U.S. state-level courts, underlining the urgent need for bolstered cybersecurity measures across these institutions. Such disruptions not only impair judicial functions but pose a threat to the integrity of democratic processes.Learn more by visiting The Record from Recorded Future News: https://lnkd.in/eCF2c6Eb

    DDoS attack on Pennsylvania court system knocks out filing systems, bail payment site therecord.media

    3

    Like Comment

    To view or add a comment, sign in

  • Jared Rimer

    Technical Support Specialist at Superior Software Inc.

    • Report this post

    Au: Hackers Follow Through with Dark Web Threat After Law Firm Rejects Ransom: GVS reports: A hacking group claiming to be Russian-linked cybercriminals has published sensitive data from one of Australia’s largest law firms, HWL Ebsworth, after the firm refused to pay their ransom demands. The AlphV ransomware gang, also known as BlackCat, announced on the dark web that it had released 1.45 terabytes of data allegedly stolen from HWL Ebsworth in late April. […] The hack has caused concern for HWL Ebsworth’s clients, which include ANZ, the South Australian, Queensland, and ACT governments, the Environment and Human Services Department, and the Australian Taxation Office (ATO). The federal government has confirmed that it was a client of the law firm and may have been affected by the breach. Read more at GVS.

    Au: Hackers Follow Through with Dark Web Threat After Law Firm Rejects Ransom https://www.databreaches.net
    Like Comment

    To view or add a comment, sign in

  • The Record from Recorded Future News

    12,576 followers

    • Report this post

    LockBit takedown: Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail. Why it matters:1. The successful takedown of over 14,000 accounts tied to the LockBit ransomware service demonstrates international cooperation and coordination in crippling cybercriminal activities. Each account represented a financial avenue for the culprits, thus significantly disrupting their operations.2. The widespread use of third-party services like Mega, Tutanota, and Protonmail for illegal purposes underscores the challenge these companies face in balancing user privacy and acting against illegal operations. Their proactive stance against illegal activity is vital to maintaining the security of these platforms for legitimate users.3. The operation — including arrests and public bounty — signals a shift in strategy by law enforcement. By exposing and penalizing affiliates, authorities apply pressure on cybercriminals, making them constantly wary and thus disrupting their actions.Learn more by visiting The Record from Recorded Future News: https://lnkd.in/e4dPXSC9

    LockBit takedown: Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail therecord.media

    4

    Like Comment

    To view or add a comment, sign in

  • Ostendio

    3,233 followers

    • Report this post

    Kansas' electronic courts system still down weeks after cyber incident | StateScoop It’s been more than three weeks since an unexplained security incident shut down Kansas’ online court system, blocking public and internal access to an unknown number of court cases and records.Courts have been operating entirely on paper since the system went down in mid-October, according to the Kansas City Star, slowing down civil and criminal cases, even limiting parents’ ability to access child support payments and background checks that need to go through the court system.The state has not disclosed what caused the breakdown, whether there was a data breach or when the system will be back online, but the system’s continued shutdown highlights the state of cybersecurity in the judiciary nationwide, which have seen an uptick in cyberattacks in recent years, alongside the rest of the public sector.https://bit.ly/3Mz809g#cybersecurity #datasecurity

    Kansas' electronic courts system still down weeks after cyber incident | StateScoop https://statescoop.com

    2

    Like Comment

    To view or add a comment, sign in

  • Mark Schutzmann

    • Report this post

    Important takedown on this expansive ransomware gang with collaboration from the international law enforcement community. Although it is satisfying to see a disruption of their dark web operations, it will be interesting to see the follow-up actions (e.g., if this is whac-a-mole, who comes out in handcuffs).https://lnkd.in/gUPkiWWe

    Lockbit cybercrime gang disrupted by Britain, US and EU reuters.com

    3

    Like Comment

    To view or add a comment, sign in

Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (33)

Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (34)

1,826 followers

  • 95 Posts

View Profile

Follow

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Anthony Spaelti on LinkedIn: The cat-and-mouse game between law enforcement and cybercriminals selling… (2024)
Top Articles
Latest Posts
Article information

Author: Van Hayes

Last Updated:

Views: 6407

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Van Hayes

Birthday: 1994-06-07

Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

Phone: +512425013758

Job: National Farming Director

Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.