As per safety journalist Brian Krebs, a Ukrainian nationwide recognized as Vyacheslav Igorevich Penchukov has been arrested by Swiss regulation enforcement companies. The suspect was nabbed for his involvement in cybercrime particularly the notorious Zeus malware.
The suspect used the nickname Tank and Father. He was arrested on 23 October 2022 from Geneva and is awaiting extradition to the USA, reported Krebs.
About Zeus
In your data, Zeus is a banking trojan created by an unknown particular person identified by the deal with lucky12345. The gadgets contaminated by this extremely adaptable malware might be included in a military of a botnet to launch distributed denial of service assaults (DDoS assaults).
The FBI needed Penchukov on cybercrime costs for greater than a decade. He was a member of one of the crucial infamous cybercrime gangs dubbed JabberZeus. Of their malicious campaigns, the cybercriminals stole over $70 million from harmless victims’ financial institution accounts.
The gang, which the US Division of Justice known as a wide-ranging racketeering enterprise, used Zeus malware for his or her operations. Reportedly, Penchukov was in a western Ukrainian metropolis known as Uzhgorod earlier than Russia invaded the nation. He traveled with pretend identification particulars and was in Geneva on the time of his arrest, the place he got here to fulfill his spouse.
It’s price noting that the suspect was charged in Nebraska again in August 2012 together with Ivan Viktorovich Klepikov, identified by the nick “nowhere” and “petrovich,” and Alexey Dmitrievich Bron, also called “thehead.”
Particulars of Expenses
In 2014, the US Division of Justice launched courtroom paperwork that exposed Penchukov labored with eight gang members. Collectively they contaminated numerous enterprise computer systems with Zeus malware to steal account numbers, passwords, and different delicate knowledge to hack financial institution accounts and siphon funds from the victims’ accounts.
They have been charged for his or her position in a botnet-based marketing campaign during which they collected focused customers’ checking account login credentials utilizing Zeus malware and drained funds from their accounts. The gang despatched the cash outdoors the USA by way of an intensive community of cash mules.
Associated Information
- Arrested: 4 hackers concerned in SIM Swap, malware assaults
- ATM hacker behind $1 billion malware heists arrested in Spain
- Japanese boy arrested for growing crypto-stealing malware
- Hacker will get 14 years jail over Scan4You malware scanning service
- Malware service operators arrested; provided antivirus bypassing instruments