You are currently viewing Hacker arrested in Russia for extorting money for decrypting data

Hacker arrested in Russia for extorting money for decrypting data

Hacker arrested in Russia for extorting money for decrypting data

A hacker was arrested in Russia for extorting money for decrypting data. After the transfer of the cryptocurrency to the hacker, representatives of the company filed a statement with the Ministry of Internal Affairs.

Irina Volk, representing the Ministry of Internal Affairs of the Russian Federation, told reporters about. The arrest of a resident of Rostov-on-Don, suspected of breaking into the database of a Russian company. It is unknown whether he is a member of a hacker group or a lone hacker.
“The operatives detained a 35-year-old resident of Rostov-on-Don, suspected of illegal access to computer information and extortion. It was preliminary established that in early 2020, the attacker encrypted significant computer information contained. In the local network of a large Russian company using a cryptographic algorithm. For decoding, he demanded to pay a monetary reward in cryptocurrency, “she said.

AND

The man asked for 0.8 bitcoin – about 500 thousand rubles. After the transfer of the cryptocurrency to the hacker, representatives of the company filed a statement. With the Ministry of Internal Affairs. After the arrest, equipment with information containing evidence extracted from the suspect. A criminal case initiated under Part 2 of Art. 163 (“Extortion”) and Part 2 of Article 272 of the Criminal Code of the Russian .Federation (“Unlawful Access to Computer Information”). The suspect is in custody.

Earlier, Rosfinmonitoring announced plans develop a system for analyzing cryptocurrency transactions using artificial intelligence. The system itself is developed due to the need to create effective government control. Over the industry of virtual assets, used by criminals for many illegal schemes. Its users will be both government authorities and the Bank of Russia or other financial organizations.

Recently, hacker groups have begun to practice publishing confidential files of the victim in case of non-payment of ransom. A prime example is the Maze group, which regularly uploads data to the Web from large companies that refused to pay her ransom ( recent examples are LG and Xerox).

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASE/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer , Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

 

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply