US readies prison cell for another Russian Trickbot developer

US readies prison cell for another Russian Trickbot developer

December 1, 2023 at 10:15AM

Vladimir Dunaev, a Russian national and developer of Trickbot malware, pled guilty in the US, facing up to 35 years in prison for creating the software responsible for significant financial damage globally. Trickbot caused tens of millions in losses since 2016, attacking hospitals, schools, and businesses. US and UK sanctions target 18 group members, with efforts continuing to extradite and prosecute them.

**Meeting Takeaway Summary: Trickbot Malware Crew Prosecutions and Developments**

1. **Key Individual Convicted**: Russian national Vladimir Dunaev, age 40, pled guilty to charges related to developing Trickbot malware. He is facing a maximum of 35 years in prison.

2. **Trickbot’s Impact**: Trickbot malware has caused tens of millions of dollars in losses since 2016 and has targeted hospitals, schools, and businesses.

3. **US Department of Justice’s Stance**: Rebecca C Lutzko highlighted that the DoJ prioritizes cybercrime investigation and prosecution, and the guilty plea signifies a determination to prosecute cybercriminals globally.

4. **Extradition and Ongoing Legal Actions**:
– Dunaev was extradited from South Korea to the US in 2021.
– Alla Witte, another developer, faced a 47-count indictment and received a prison sentence of two years and eight months in June 2023.
– In 2023, the US and UK issued financial sanctions against 11 other Trickbot-related individuals, adding to a prior sanction round, prohibiting them from travelling or doing business in the US/UK and facing indictment in the US.
– The UK National Crime Agency cited global extortion of at least $180 million by the group, with $34 million from victims in the UK.

5. **Trickbot’s Evolution and Connections**:
– Trickbot evolved from a banking trojan, with its activities beginning in 2016, and showed development with features adding worm-like capabilities in 2017.
– It is connected to deploying ransomware like Ryuk and has associations with Emtotet and the Conti ransomware gang.
– Considered a successor to Dyre malware, though no official prosecutorial link was made.

6. **Wizard Spider Group**:
– Behind Trickbot, Conti, and Ryuk, identified as Wizard Spider, it faces significant attention from US law enforcement, including substantial bounties for information.
– Has a business-like structure with subgroups and conventional job titles.

7. **Extradition Challenges**:
– If the individuals’ links to Russia are confirmed, extradition might be unlikely unless they travel to countries with US extradition agreements.

**Action Points**:
– Continue to monitor the legal proceedings of indicted Trickbot members.
– Stay updated on international law enforcement efforts and sanctions regarding cybercrime, particularly those involving the Wizard Spider group.
– Maintain awareness of the cybersecurity landscape and emerging threats from groups like Trick Spider.

Full Article