Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying
The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals and the takedown of their sprawling botnet offers the clearest example in years of how a single malware operation allegedly enabled hacking operations as varied as ransomware, wartime cyberattacks in Ukraine, and spying against foreign governments.
The US Department of Justice today announced criminal charges today against 16 individuals law enforcement authorities have linked to a malware operation known as DanaBot, which according to a complaint infected at least 300,000 machines around the world. The DOJβs announcement of the charges describes the group as βRussia-based,β and names two of the suspects, Aleksandr Stepanov and Artem Aleksandrovich Kalinkin, as living in Novosibirsk, Russia. Five other suspects are named in the indictment, while another nine are identified only by their pseudonyms. In addition to those charges, the Justice Department says the Defense Criminal Investigative Service (DCIS)βa criminal investigation arm of the Department of Defenseβcarried out seizures of DanaBot infrastructure around the world, including in the US.
Aside from alleging how DanaBot was used in for-profit criminal hacking, the indictment also makes a rarer claimβit describes how a second variant of the malware it says was used in espionage against military, government, and NGO targets. βPervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,β US attorney Bill Essayli wrote in a statement.
Β© Getty Images