HomeData BreachLockBit Ransomware Hacker Ordered to Pay $860,000 After Responsible Plea in Canada

LockBit Ransomware Hacker Ordered to Pay $860,000 After Responsible Plea in Canada

A 34-year-old Russian-Canadian nationwide has been sentenced to almost 4 years in jail in Canada for his participation within the LockBit world ransomware operation.

Mikhail Vasiliev, an Ontario resident, was initially arrested in November 2022 and charged by the U.S. Division of Justice (DoJ) with “conspiring with others to deliberately injury protected computer systems and to transmit ransom calls for in reference to doing so.”

Information of Vasiliev’s jail time period was first reported by CTV Information.

The defendant, who had his dwelling searched by Canadian legislation enforcement authorities in August and October 2022, is alleged to have stored a listing of “potential or historic” victims and screenshots of communications exchanged with “LockBitSupp” on the Tox messaging platform.

The raid additionally uncovered a textual content file with directions to deploy LockBit ransomware, the ransomware supply code, and a management panel utilized by the e-crime group to ship the file-locking malware.

Vasiliev, in line with CTV Information, pleaded responsible to eight counts of cyber extortion, mischief, and weapons expenses final month. In the course of the sentencing, he was characterised by Justice Michelle Fuerst as a “cyber terrorist” who was “motivated by his personal greed.”

See also  Yacht retailer MarineMax discloses data breach after cyberattack

He’s believed to have develop into a cyber prison whereas at dwelling in the course of the COVID-19 pandemic, making an attempt to hunt ransom funds from three Canadian corporations between 2021 and 2022 by stealing their knowledge and holding it hostage.

Vasiliev, who has consented to being extradited to the U.S., has additionally been ordered to pay again greater than $860,000 in restitution.

One of the prolific ransomware teams in historical past, LockBit suffered an enormous blow in February 2024, when its infrastructure was seized in a coordinated legislation enforcement operation. The disruption was accompanied by arrests of three LockBit associates in Poland and Ukraine.

Though the group reemerged with a brand new knowledge leak web site, there’s proof to recommend that the brand new victims being listed are both previous or faux, designed to provide an impression that the group is again up and working.

The event arrives as a federal jury in Washington, D.C., convicted Roman Sterlingov, a twin Russian-Swedish nationwide, for his operation of Bitcoin Fog from 2011 by means of 2021, facilitating the laundering of income produced from the sale of unlawful narcotics, laptop crimes, stolen identities, and youngster sexual abuse materials.

See also  Google Fixes Excessive-Severity Chrome Flaw Actively Exploited within the Wild

Ilya Lichtenstein, who pleaded responsible in August 2023 to the theft of about 120,000 bitcoin in connection to the hack of the Bitfinex cryptocurrency trade, testified final month how he had used Bitcoin Fog 10 occasions to launder the digital property, Bloomberg reported.

“Bitcoin Fog was the longest-running cryptocurrency ‘mixer,’ gaining notoriety as a go-to cash laundering service for criminals searching for to cover their illicit proceeds from legislation enforcement,” the DoJ mentioned.

“Over the course of its decade-long operation, Bitcoin Fog moved over 1.2 million bitcoin, which was valued at roughly $400 million on the time of the transactions.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular