Tuesday, July 16, 2024

Kozlovsky from Lurk Hacker Group admits that his group involved in creation of WannaCry and DNC hack on Demand

Arrested Hacker Konstantin Kozlovsky from Lurk Hacker group admits that he is one of the Author of WannaCry ransomware and the work was commissioned by intelligence agencies said in an interview to Dozhd TV channel.

WannaCry (WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) Attack Started on 12 May 2017 and Infected more than 3,00,000 computers in over 150 countries which consider as one of the Biggest Ransomware cyber Attack which world Never Faced.

WannyCry Ransomware outbreak performs all over the world in many countries.including Russia, Ukraine, India, and Taiwan are the countries which Faced Major Hit by Wanncry Ransomware.Kaspersky Lab has uncovered new evidence linking the WannaCry ransomware code to North Korea.

The virus was tested on computers of the Samolet Development company which is engaged in the construction of housing in Moscow area. Also, hackers planned to hack a network of Novolipetsk Steel and to try to stop its blast furnaces. says Kozlovsky.

He was arrested in Yekaterinburg a city in Russia, in charge of a scam in part of Lurk Hacker group. According to Kozlovsky, the ransomware was created by Lurk Hacker group.

He is now being held in a pre-trial detention center. Earlier the hacker told that he “under the direction of the Federal Security Service” cracked servers of the Democratic party of the USA and e-mail of Hillary Clinton. Kozlovsky said that employee of the Federal Security Service (FSB) contacted him.reads crime Russia statement.

According to analysis reports WannaCry potential damage costs up to $1 billion in bitcoins and it shows all technology environment how much it is important to keep eye on Cyber Security.


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles