QUIK conviction

There’s been an update on the Trojan case we mentioned earlier this week – a 24 year old has been sentenced to five and a half years for computer crime. He was found guilty under Section 1, Article 272 (unlawful access to legally protected computer data) and Section 4, Article 159 (gross fraud) of the Russian Federal Criminal Code and will serve out his sentence in a minimum-security correctional facility.

The case stated that “between June and August 2007, the accused used a malicious program to get the secret key of a commercial organization and, in the name of the organization, traded futures on the commercial market.” The losses totalled more than 1.3 million roubles.

The young man, who admitted his guilt in court, transferred 1,000,000 of his ill-gotten roubles to a personal account which he opened with one of the local Yoshkar-Ola banks.

QUIK conviction

Your email address will not be published. Required fields are marked *



Focus on DroxiDat/SystemBC

An unknown actor targeted an electric utility in southern Africa with Cobalt Strike beacons and DroxiDat, a new variant of the SystemBC payload. We speculate that this incident was in the initial stages of a ransomware attack.

APT trends report Q2 2023

This is our latest summary of the significant events and findings, focusing on activities that we observed during Q2 2023.

Meet the GoldenJackal APT group. Don’t expect any howls

GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and South Asia. The main feature of this group is a specific toolset of .NET malware, JackalControl, JackalWorm, JackalSteal, JackalPerInfo and JackalScreenWatcher.

Subscribe to our weekly e-mails

The hottest research right in your inbox