Cybercriminals attacked the websites of American universities and Korean companies. The total damage from their actions amounted to $ 500 million. In 2019, they attacked four companies from South Korea with the Clop virus.
The program blocked 810 internal servers and employees’ personal computers. Later, in 2021, the same group of hackers attacked the medical schools of Stanford University, the University of Maryland and the University of California in the United States. For decryption, the criminals received a ransom in cryptocurrency.
The total amount of damage was $ 500 million, according to the website of the Ukrainian General Prosecutor’s Office. Cybercriminals operated from the territory of Independent. In 2019, they managed to attack four South Korean companies with the virus. The police conducted 24 searches in Kiev and the suburbs: equipment, cars, about $ 58,000, 3,000 euros and more than 1.5 million hryvnias were seized from members of the group, the Prosecutor General’s Office of Ukraine reported.
Ukraine Police said in a statement on Wednesday, “The hacker group was exposed by officers of the Cyberpolice Department together with the Main Investigation Department of the National Police. The perpetrators were exposed as part of an international operation to promote and coordinate Interpol (IGCI), and together with law enforcement officials from the Republic of Korea and the United States.”
“It was established that six defendants carried out attacks of malicious software such as “Ransomware” on the servers of American and Korean companies. For deciphering the data, they demanded a “ransom”, and in case of non-payment, they threatened to disclose the confidential data of the victims,” it added.
Earlier, the cybercriminal group Clop published on the darknet a CAD drawing of a military radar system developed by military contractor Leonardo and installed on a number of US and UAE aircraft. The ransomware got at least one drawing of a Leonardo Seaspray 7500E radar antenna. Sources familiar with military radar systems and antennas looked at the leaked blueprint, identified the device, and confirmed the model.
Catch up on more articles here
Follow us on Twitter here