Scamming the hacker and getting caught

npub1cluc6gran6qtzntkq0wlh06hl6yuhz5cwgpf7qyhgxvth3wtcheqnqtgjy
hex
f7004b21ac9f69030c92f6e0fb6a39a8c708814c1bb1a9632ff08901c3366335nevent
nevent1qqs0wqztyxkf76grpjf0dc8mdgu633cgs9xphvdfvvhlpzgpcvmxxdgprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsv07vdyp7eaq93f4mq8h0mhatlazwt32v8yq5lqzt5rx9mch9utus5ds2t3Kind-1 (TextNote)
Scamming the hacker and getting caught
Russian authorities have arrested a Moscow resident for posing as an FSB intelligence officer to extort and demand payments from members of the Conti ransomware group.
Ruslan Satuchin was detained in October of last year and has remained in custody after authorities extended his arrest warrant in December.
According to Russian news outlet RBC, the suspect contacted a Conti member in September of 2022, claiming he could prevent the FSB from investigating them for a bribe.
While the report doesn't mention how Satuchin identified the Conti members, his alleged extortion campaign began six months after an unnamed Ukrainian IT specialist hacked the group and released internal chats on the internet, shortly after Russia's invasion of Ukraine.
Within weeks of the dump, several threat intel specialists linked some Conti members to their real world identities, with many members being based in Russia.
RBC reported that Satuchin is pleading not guilty and had known of the investigation against him before his arrest, but refused to flee the country. A Moscow court denied his request for release on house arrest in December, with prosecutors claiming he might try to intimidate Conti members to withdraw their accusations.
The Conti gang has been operational and launching attacks for more than a decade now. It initially launched under the name Ryuk, and later became Conti. After its 2022 leak, the group's members have been linked to a bunch of smaller ransomware operations, such as BlackSuit, Royal, and Chaos.
Conti is believed to have hacked hundreds of organizations across the world and made an estimated $150 million from their ransomware attacks.
Even if the US State Department has rewards for up to $10 million for information on Conti members for their past attacks, Russian media kept calling them "patriotic hackers" in all their reports this week, just because they never attacked Russian companies. Nice moral compass you got there, Russia!
Satuchin faces up to ten years in prison if found guilty.
[h/t Oleg Shakirov, A.C.]
Riskybiz
#cybernews #slingshotvpn

原始 JSON
{
"kind": 1,
"id": "f7004b21ac9f69030c92f6e0fb6a39a8c708814c1bb1a9632ff08901c3366335",
"pubkey": "c7f98d207d9e80b14d7603ddfbbf57fe89cb8a9872029f00974198bbc5cbc5f2",
"created_at": 1772252202,
"tags": [
[
"alt",
"A short note: Scamming the hacker and getting caught\n\nRussian au..."
],
[
"t",
"cybernews"
],
[
"t",
"slingshotvpn"
],
[
"r",
"https://blossom.primal.net/c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe.jpg"
],
[
"imeta",
"url https://blossom.primal.net/c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe.jpg",
"x c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe",
"size 52195",
"m image/jpeg",
"dim 612x408",
"blurhash rEK^dEqGvyL3f,rCxBpJEM~q}m=_EMNH$%xFW=Ip00pJ%1IUa{tRM|jFt7-q-7$#Ipxat6Ios:R+IpozxFV?xaozIo%1IpxaEME2oeNbafRjt6NG",
"ox c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe",
"alt "
]
],
"content": "Scamming the hacker and getting caught\n\nRussian authorities have arrested a Moscow resident for posing as an FSB intelligence officer to extort and demand payments from members of the Conti ransomware group.\n\nRuslan Satuchin was detained in October of last year and has remained in custody after authorities extended his arrest warrant in December.\n\nAccording to Russian news outlet RBC, the suspect contacted a Conti member in September of 2022, claiming he could prevent the FSB from investigating them for a bribe.\n\nWhile the report doesn't mention how Satuchin identified the Conti members, his alleged extortion campaign began six months after an unnamed Ukrainian IT specialist hacked the group and released internal chats on the internet, shortly after Russia's invasion of Ukraine.\n\nWithin weeks of the dump, several threat intel specialists linked some Conti members to their real world identities, with many members being based in Russia.\n\nRBC reported that Satuchin is pleading not guilty and had known of the investigation against him before his arrest, but refused to flee the country. A Moscow court denied his request for release on house arrest in December, with prosecutors claiming he might try to intimidate Conti members to withdraw their accusations.\n\nThe Conti gang has been operational and launching attacks for more than a decade now. It initially launched under the name Ryuk, and later became Conti. After its 2022 leak, the group's members have been linked to a bunch of smaller ransomware operations, such as BlackSuit, Royal, and Chaos.\n\nConti is believed to have hacked hundreds of organizations across the world and made an estimated $150 million from their ransomware attacks.\n\nEven if the US State Department has rewards for up to $10 million for information on Conti members for their past attacks, Russian media kept calling them \"patriotic hackers\" in all their reports this week, just because they never attacked Russian companies. Nice moral compass you got there, Russia!\n\nSatuchin faces up to ten years in prison if found guilty.\n[h/t Oleg Shakirov, A.C.]\nRiskybiz\n#cybernews #slingshotvpn\n https://blossom.primal.net/c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe.jpg https://blossom.primal.net/c1a60399dbbb8da657c5ffbd7b508a538905b36939b49ac002646546a7161bfe.jpg",
"sig": "fba48d7be8c618d00b625f1773a7faa887d39f61dcc44eed99894df097ed44e0c9461d50d3f41161bf80c6620b0e2133096e446033947dd3ca3ee3a228ef162a"
}