Hacktechmedia

Silence APT's Worldwide Reconnaissanc

In a landmark decision, a U.S. court has sentenced Andrei Tyurin, a 37-year-old Russian hacker, to 12 years in prison for orchestrating an extensive international hacking campaign. The cybercriminal targeted financial institutions, brokerage firms, financial news publishers, and prominent American companies, resulting in the theft of a massive trove of personal information. Tyurin’s hacking spree, carried out from his Moscow home between 2012 and mid-2015, amounted to one of the largest breaches of U.S. customer data in history.

Tyurin’s Multimillion-Dollar Intrusion Schemes

Charged with computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses, Tyurin collaborated with his partner Gery Shalon to manipulate stock prices, artificially inflating certain stocks publicly traded in the U.S. The duo marketed these stocks deceptively to customers whose contact information was stolen during the cyber intrusions. Tyurin’s hacking activities extended across five continents, using remotely controlled computer infrastructure. The stolen data from victims’ networks included personal information from over 80 million J.P. Morgan Chase customers.

The Global Impact of Silence APT Group

In a parallel development, the notorious Silence APT group, a Russian-speaking cybercriminal organization, has expanded its reach, targeting banks in over 30 countries across America, Europe, Africa, and Asia. Known for sophisticated attacks on financial organizations, the group recently succeeded in a high-stakes campaign against Bangladesh-based Dutch-Bangla Bank, resulting in a loss of over $3 million through ATM cash withdrawals.

Evolving Tactics of Silence APT

The Silence APT group, active since at least September 2016, has evolved into one of the most sophisticated advanced persistent threat (APT) groups globally. The hackers have updated their tactics, techniques, and procedures (TTP) to evade detection, changing encryption alphabets, string encryption, and commands for their bot and main module. Spear-phishing remains their primary method of compromise, with the group using malicious attachments like macros Docs, exploits, CHM files, and .LNK shortcuts.

Silence APT’s Global Reconnaissance

The group’s campaigns are no longer confined to Russia and former Soviet countries but have expanded across Asia and Europe. Silence APT creates an up-to-date “target list” by sending reconnaissance emails, featuring pictures or links without malicious payloads. The cybercriminals have sent over 170,000 recon emails to banks in Russia, Asia, and Europe, indicating a shift in their focus. In November 2018, Silence APT targeted the Asian market for the first time, sending approximately 80,000 emails, with more than half directed at Taiwan, Malaysia, and South Korea.

Heightened Damages and Financial Loss

Recent research reveals that Silence APT’s operations have inflicted increasing damage, with their total funds stolen skyrocketing to $4.2 million. The cybercriminal group’s activities have become more pervasive and sophisticated, posing a significant threat to banks worldwide. As authorities continue to grapple with the evolving landscape of cyber threats, the battle against these cybercriminals intensifies.

In the realm of cybersecurity, the conviction of Tyurin and the escalating activities of Silence APT underscore the pressing need for global cooperation to combat cybercrime and safeguard sensitive personal and financial information.

#Cybercrime #Russian Hacker#Silence APT#Financial Breach#Global Cyber Threat#Cybersecurity#Data TheftInternational #Hacking

Thanks &Regards :Ashwini kamble

Digital Marketer

Leave a Reply

Your email address will not be published. Required fields are marked *

Open chat
Hello
Can we help you?