US offers $1 million for details on alleged Russian hacker

Avatar

The U.S. State Department on Thursday announced it is offering a $1 million reward for information on a Russian hacker responsible for “multiple significant” computer intrusions against American targets.

The agency is offering the money through its Rewards for Justice program for information on the whereabouts of Tim Vakhaevich Stigal, who was charged by the Justice Department in January with participating in four different conspiracies to traffic in stolen payment card information belonging to the customers of at least three separate corporate victims between 2014 and 2016.

Stigal was charged with four counts of wire fraud conspiracy, 12 counts of wire fraud, one count of computer fraud extortion, three counts of access device fraud and three counts of aggravated identity theft.

His malicious cyberactivity landed him on the U.S. Secret Service’s Most Wanted Fugitive page.

The reward announcement comes the day after the U.S.government cracked down on a Russian-linked influence network that pumped out disinformation to the American public ahead of the upcoming presidential election.

For its part, the State Department said it would go after the operations of Rossiya Segodnya, the parent company of state broadcaster Russia Today, and put in place a new visa restriction policy for the firm’s subsidiaries. 

The department also announced a $10 million reward for information on individuals involved in the RT-linked Russian hacking group RaHDit.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

 

Total
0
Shares
Previous Post

Microchip Technology says employee contact info stolen by hackers during cyberattack

Next Post

Use of Predator spyware rebounds after a dip from Biden sanctions, researchers say

Related Posts

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.csyndication[
Avatar
Read More

SafeWallet Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

SafeWallet has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts. The multi-signature (multisig) platform, which has roped in Google Cloud Mandiant to
Avatar
Read More

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. "RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,"
Avatar
Read More