Russian sentenced to five years in prison for Trickbot malware

Russian sentenced to five years in prison for Trickbot malware

A Russian man involved in developing the Trickbot malware has been sentenced to more than five years in prison in Ohio
A Russian man involved in developing the Trickbot malware has been sentenced to more than five years in prison in Ohio. Photo: SCOTT OLSON / GETTY IMAGES/Getty Images via AFP
Source: AFP

A Russian man has been sentenced to more than five years in prison for his involvement in developing the Trickbot malware used to extort businesses, including hospitals during the Covid pandemic, the US Justice Department said Thursday.

Vladimir Dunaev, 40, who was extradited from South Korea to the United States in 2021, pleaded guilty in November to conspiracy to commit computer fraud and identity theft and conspiracy to commit wire fraud and bank fraud.

Dunaev, originally from Amur Oblast, was sentenced to five years and four months in prison by a judge in the midwestern state of Ohio on Wednesday, the Justice Department said in a statement.

Dunaev was among nine Russians, some of whom are alleged to have links to Russian intelligence services, who were indicted in the United States for involvement in Trickbot, which was taken down in 2022.

Read also

Spurs tycoon Lewis pleads guilty to insider trading: prosecutor

According to the Justice Department, Dunaev provided "specialized services and technical abilities in furtherance of the Trickbot scheme."

"Dunaev developed malicious ransomware and deployed it to attack American hospitals, schools, and businesses," US Attorney Rebecca Lutzko said.

"He and his co-defendants caused immeasurable disruption and financial damage, maliciously infecting millions of computers worldwide."

According to the indictments, the Trickbot group deployed malware and an associated ransomware program called Conti to attack hundreds of targets across the United States and in more than 30 other countries since 2016.

The malware was also used to steal bank account logins and passwords from victims' computers in order to drain money from the accounts.

According to Britain's National Crime Agency, the operation reaped at least $180 million worldwide.

The group particularly targeted hospitals and healthcare services during the 2020-2021 coronavirus pandemic, authorities said.

Read also

UAE sued in $2.8bn US lawsuit over 'dark PR' disinformation op

They would invade a computer system and encrypt all the data, demanding hundreds of thousands or even millions of dollars, paid in cryptocurrency, to free up the systems.

In one attack, the group used ransomware against three Minnesota medical facilities, disrupting their computer networks and telephones and causing a diversion of ambulances, US officials said.

In July 2020, an attack hit a local government in a Tennessee town, locking down local emergency medical services and the police department.

A May 2021 virtual incursion against a California hospital network, Scripps Health, locked up the computers of some 24 acute-care and outpatient facilities.

Another Trickbot member, Alla Witte, a Latvian national, pleaded guilty to conspiracy to commit computer fraud in June after being extradited from Suriname, where she helped write code for Trickbot and laundered proceeds from the ransomware.

Witte was sentenced to two years and eight months in prison.

New feature: Сheck out news that is picked for YOU ➡️ click on “Recommended for you” and enjoy!

Source: AFP

Authors:
AFP avatar

AFP AFP text, photo, graphic, audio or video material shall not be published, broadcast, rewritten for broadcast or publication or redistributed directly or indirectly in any medium. AFP news material may not be stored in whole or in part in a computer or otherwise except for personal and non-commercial use. AFP will not be held liable for any delays, inaccuracies, errors or omissions in any AFP news material or in transmission or delivery of all or any part thereof or for any damages whatsoever. As a newswire service, AFP does not obtain releases from subjects, individuals, groups or entities contained in its photographs, videos, graphics or quoted in its texts. Further, no clearance is obtained from the owners of any trademarks or copyrighted materials whose marks and materials are included in AFP material. Therefore you will be solely responsible for obtaining any and all necessary releases from whatever individuals and/or entities necessary for any uses of AFP material.