Threat Intelligence

6/13/2017
03:00 PM
50%
50%

A Former FBI Most Wanted Cybercriminal is Extradited to US

The Latvian man is charged with four counts of wire fraud and unauthorized computer use in a "scareware" scheme that netted more than $2 million.

Federal authorities extradited a Latvian man from Poland to charge him in a "scareware" and hacking criminal case, which targeted readers of the Minneapolis Star Tribune website, the Department of Justice announced this week.

Peteris Sahurovs, a 28-year-old man who at one time was No. 5 on the FBI's Most Wanted List for cybercriminals, allegedly pilfered more than $2 million from the Minneapolis Star Tribune's readers.

Creating a fake advertising agency, Sahurovs and his cohorts purchased online advertising space from the Minneapolis Star Tribune for a bogus American hotel chain, according to the indictment. After the ad began to run, the group changed the ad's computer code to infect startribune.com visitors with malware.

Once the readers got infected with malware, their computers would "freeze up" and show pop-up warnings that they needed to purchase "antivirus" software to fix the bogus problem. When affected readers purchased the phony antivirus software, the pop-up ads ceased and they could access the data and files on their computers, whereas those that didn't make the purchase lost access to the data.

Read more about the "scareware" scheme here

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR Institute,  12/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20102
PUBLISHED: 2018-12-12
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing...
CVE-2018-20103
PUBLISHED: 2018-12-12
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
CVE-2018-1480
PUBLISHED: 2018-12-12
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 does not set the 'HttpOnly' attribute on authorization tokens or session cookies. If a Cross-Site Scripting vulnerability also existed attackers may be able to get the cookie values via malicious JavaScript and then hijack the user sessi...
CVE-2018-1481
PUBLISHED: 2018-12-12
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 140763.
CVE-2018-1484
PUBLISHED: 2018-12-12
IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent...