Current:Home > Markets$10M reward for Russian hacking mastermind who targeted Ukraine -Thrive Success Strategies
$10M reward for Russian hacking mastermind who targeted Ukraine
View
Date:2025-04-17 09:56:41
Federal authorities are offering $10 million for help locating a Russian hacker accused of supporting the 2022 invasion of Ukraine by attacking government computers while posing as a common cybercriminal but in fact working with Russian military intelligence.
Amin Timovich Stigal attacked essential, non-military Ukrainian government computer systems before the invasion; published citizen data in an effort to sow doubt in the government; and later went after countries that supported Ukraine, including the U.S., according to a federal indictment filed this week in Maryland, where he targeted a U.S. government agency.
The Chechnya-born hacker ran a malware scheme known as “WhisperGate,” which is meant to look like a common ransomware attack. Federal prosecutors say WhisperGate is actually a “cyberweapon” designed to delete the victims’ data and render target computers inoperable.
Stigal, 22, operated the scheme for the Main Directorate of the General Staff (GRU), an infamous military intelligence agency created under former Soviet dictator Joseph Stalin.
“As alleged, the defendant conspired with Russian military intelligence on the eve of Russia’s unjust and unprovoked invasion of Ukraine,” said Attorney General Merrick B. Garland in a press release. “The Justice Department will continue to stand with Ukraine on every front in its fight against Russia’s war of aggression, including by holding accountable those who support Russia’s malicious cyber activity.”
The Russian operative remains at large. If convicted, he faces up to five years in prison. He is listed among the FBI’s Most Wanted cybercriminals.
'putinkrab':Feds launch hunt, offer $10 million reward for Russian ransomware mastermind
Attacks on Ukraine
Stigal and his unnamed GRU co-conspirators targeted some of the most-used Ukrainian government services in the months leading up to the invasion in February 2022.
The attacks hit at least two dozen protected computers, including at the Ukrainian Ministry of International Affairs, Treasury, Judiciary Administration, Agriculture, Ministry of Energy and State Emergency Service, the indictment says.
WhisperGate cyber hits were disguised to look like the work of a common cybercriminal, not statecraft, and were accompanied by messages demanding $10,000 in Bitcoin to recover stolen data.
But the hackers' real goal was to delete the data and render the state computers inoperable.
GRU hackers aimed directly at Ukrainian citizens as well, stealing the data of 13.5 million users of the government’s Portal for Digital Services (DIIA), an essential website for accessing government services and IDs, and listing it for sale on the darknet, court filings say.
They displayed messages on the DIIA website weeks ahead of the invasion that read, “Ukrainians! All information about you has become public, be afraid and expect the worst. This is for your past, present and future.”
Stigal and his co-conspirators hid their connections to the Russian government by using false identities, making false statements and using a network of computers around the world, including the U.S., according to the indictment. They funded their operations using Bitcoin.
Stigal began working with the GRU in December 2020, the indictment says.
More:Multiple people, including a priest, killed in attacks in Russian Republic, officials say
Other attacks
Stigal and his WhisperGate co-conspirators began attacking countries supporting Ukraine following the invasion, including the U.S., according to the indictment.
The group went after the transportation infrastructure of an unnamed Central European country instrumental in delivering aid to Ukraine and a Maryland-based U.S. government agency.
Baltimore FBI agents investigating did not respond to questions about what government agency the group targeted.
Stigal and the hackers probed public-facing agency websites 63 times, according to the agency.
veryGood! (174)
Related
- Former Danish minister for Greenland discusses Trump's push to acquire island
- Meet first time Grammy nominee Charley Crockett
- B.A. Parker is learning the banjo
- Justice Department, Louisville reach deal after probe prompted by Breonna Taylor killing
- Working Well: When holidays present rude customers, taking breaks and the high road preserve peace
- Which apps offer encrypted messaging? How to switch and what to know after feds’ warning
- 'We're reborn!' Gazans express joy at returning home to north
- At site of suspected mass killings, Syrians recall horrors, hope for answers
- Could your smelly farts help science?
- San Francisco names street for Associated Press photographer who captured the iconic Iwo Jima photo
Ranking
- Brianna LaPaglia Reveals The Meaning Behind Her "Chickenfry" Nickname
- IRS recovers $4.7 billion in back taxes and braces for cuts with Trump and GOP in power
- Are Instagram, Facebook and WhatsApp down? Meta says most issues resolved after outages
- What do we know about the mysterious drones reported flying over New Jersey?
- SFO's new sensory room helps neurodivergent travelers fight flying jitters
- Hackers hit Rhode Island benefits system in major cyberattack. Personal data could be released soon
- Don't let hackers fool you with a 'scam
- Highlights from Trump’s interview with Time magazine
Recommendation
Trump suggestion that Egypt, Jordan absorb Palestinians from Gaza draws rejections, confusion
At site of suspected mass killings, Syrians recall horrors, hope for answers
Don't let hackers fool you with a 'scam
Paula Abdul settles lawsuit with former 'So You Think You Can Dance' co
Which apps offer encrypted messaging? How to switch and what to know after feds’ warning
All That You Wanted to Know About She’s All That
The city of Chicago is ordered to pay nearly $80M for a police chase that killed a 10
At site of suspected mass killings, Syrians recall horrors, hope for answers