Saturday, January 18, 2025
HomeComputer SecurityMan will be Sentenced Upto 35 years in Prison For Offer Illegal...

Man will be Sentenced Upto 35 years in Prison For Offer Illegal Anti-Virus Services to Computer Hackers

Published on

SIEM as a Service

Follow Us on Google News

A Man who resided in Latvian has been arrested for running illegal Anti-Virus operation called “Scan4you,” that helps malware authors to test their samples and confirm whether it would be detected by any other antivirus software.

His operation provide some of the sophisticated services for the world’s most destructive hackers to perform various detection test and evade the Legitimate antivirus software to compromise the victims.

Ruslan Bondars Age 37, convicted in a US court of one count of conspiracy to violate the Computer Fraud, commit wire fraud and computer intrusion with intent to cause damage.

Bondars operates Scan4you around 7 years (2009-2016) meanwhile he provided various information to cyber criminals including the details that will determine whether their malware would be detected by antivirus software.

Most of the anti-virus that he provided the information is used to protect major U.S. retailers, financial institutions and government agencies from computer intrusions.

John P. Cronan, Acting Assistant Attorney General of the Justice, said, Ruslans Bondars helped hackers test and improve the malware they then used to inflict hundreds of millions of dollars in losses on American companies and consumers,”

Most Destructive Malware Tested with Scan4you

A customer of Scan4you tested his sample was heavily sophisticated and it was used to steal approximately 40 million credit and debit card numbers.

“Also the Malware steal 70 million addresses, phone numbers and other pieces of personal identifying information, from retail store locations throughout the United States, causing one retailer approximately $292 million in expenses resulting from the intrusion.”

Another malware called “Citadel” also tested within this Scan4you operation that was used to infect over 11 million computers worldwide, including in the United States that resulted in over $500 millions.

According to U.S Justice, Citadel Malware author abused the Scan4you API that was used to directly integrate into  the Citadel malware toolkit and the  API tool allowed Scan4you users the flexibility to scan malware without the need to directly submit the malware to Scan4you’s website.

 35 Years in Prison

Legitimate antivirus scanners such as VirusTotal share data about uploaded files with the antivirus community and notify the result to  their users but Scan4you instead informed its users that they could upload files anonymously and promised not to share information about the uploaded files with the antivirus community.

Bondars have chances to faced maximum penalty of 35 years in prison and the sentenced will be held on September 21 2018.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web...