{"id":6422,"date":"2017-01-28T16:17:28","date_gmt":"2017-01-29T00:17:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/28\/news-259\/"},"modified":"2017-01-28T16:17:28","modified_gmt":"2017-01-29T00:17:28","slug":"news-259","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/28\/news-259\/","title":{"rendered":"A Shakeup in Russia&#8217;s Top Cybercrime Unit"},"content":{"rendered":"<p>A chief criticism I heard from readers of my book, <em><a href=\"https:\/\/www.amazon.com\/Spam-Nation-Organized-Cybercrime---Epidemic\/dp\/1402295618\/ref=sr_1_1?ie=UTF8&amp;qid=1400765293&amp;sr=8-1&amp;keywords=spam+nation\" target=\"_blank\">Spam Nation: The Inside Story of Organized Cybercrime<\/a><\/em>, was that it dealt primarily with petty crooks involved in petty\u00a0crimes, while ignoring more substantive security issues like government surveillance and cyber war. But now it appears\u00a0that the chief antagonist of <em>Spam Nation<\/em>\u00a0is at the dead center of an international scandal involving the hacking of U.S. state electoral boards in Arizona and Illinois, the sacking of\u00a0Russia&#8217;s top cybercrime investigators, and the slow but steady leak of unflattering data on some of Russia&#8217;s most powerful politicians.<\/p>\n<div id=\"attachment_37848\" style=\"width: 188px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-37848\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/mikhaylov.png\" alt=\"Sergey Mikhaylov\" width=\"178\" height=\"182\" \/><\/p>\n<p class=\"wp-caption-text\">Sergey Mikhaylov<\/p>\n<\/div>\n<p>In a major shakeup that could have lasting implications for transnational cybercrime investigations, it&#8217;s emerged that Russian authorities last month arrested <strong>Sergey Mikhaylov<\/strong> &#8212; the deputy chief\u00a0of the country&#8217;s top anti-cybercrime unit &#8212; as well as <strong>Ruslan Stoyanov<\/strong>, a senior employee at Russian security firm <strong>Kaspersky Lab.\u00a0<\/strong><\/p>\n<p>In a statement released to media, Kaspersky said the charges against Stoyanov predate his employment at the company beginning in 2012. Prior to Kaspersky, Stoyanov served as deputy director at a cybercrime investigation firm called <strong>Indrik<\/strong>, and before that as a major in the Russian Ministry of Interior&#8217;s Moscow Cyber Crime Unit.<\/p>\n<p>In a move straight out of a Russian spy novel, Mikhaylov reportedly was arrested while in the middle of a meeting, escorted out of the room with a bag thrown over his head. Both men are being tried for treason. As a result, the government&#8217;s case against them\u00a0is classified, and it&#8217;s unclear exactly what they are alleged to have done.<\/p>\n<p>However, many Russian media outlets now report that\u00a0the men are suspected of leaking information to Western investigators about Russian cyber intelligence operations, and of funneling personal and often embarrassing data on\u00a0Russia&#8217;s political elite to <a href=\"http:\/\/www.bbc.co.uk\/monitoring\/russias-humpty-dumpty-blog-spills-the-beans\" target=\"_blank\">a popular blog<\/a>\u00a0called Humpty Dumpty\u00a0(<a href=\"https:\/\/b0ltai.org\/\" target=\"_blank\">\u0428\u0430\u043b\u0442\u0430\u0439-\u0411\u043e\u043b\u0442\u0430\u0439<\/a>).<span id=\"more-37823\"><\/span><\/p>\n<p>According to information obtained by KrebsOnSecurity, the arrests may very well be tied to a long-running grudge held by <strong>Pavel Vrublevsky<\/strong>, a Russian businessman who for years paid most of the world&#8217;s top spammers and virus writers to pump malware and hundreds of billions of junk emails into U.S. inboxes.<\/p>\n<div id=\"attachment_37847\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/shaltay.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-37847 size-medium\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/shaltay-580x329.png\" alt=\"The Twitter page of the blog Shaltay Boltay (Humpty Dumpty).\" width=\"580\" height=\"329\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/shaltay-580x329.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/shaltay-768x435.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/shaltay.png 898w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">The Twitter page of the blog Shaltay Boltay (Humpty Dumpty).<\/p>\n<\/div>\n<p>In September 2016, Arlington, Va.-based security firm <strong>ThreatConnect<\/strong> published a report that included Internet addresses that were used as staging grounds in the U.S. state election board hacks [full disclosure: ThreatConnect has been an advertiser on this blog]. That report was based in part on <a href=\"https:\/\/s.yimg.com\/dh\/ap\/politics\/images\/boe_flash_aug_2016_final.pdf\" target=\"_blank\">an August 2016 alert from the FBI<\/a>\u00a0(PDF), and noted that most of the Internet addresses were assigned to a Russian hosting firm called\u00a0<strong>King-Servers[dot]com<\/strong>.<\/p>\n<p>King-Servers is owned by a 26-year-old Russian named <a href=\"https:\/\/www.nytimes.com\/2016\/09\/28\/world\/europe\/russia-hacker-vladimir-fomenko-king-servers.html\" target=\"_blank\">Vladimir Fomenko<\/a>.\u00a0As I observed in this month&#8217;s <a href=\"https:\/\/krebsonsecurity.com\/2017\/01\/the-download-on-the-dnc-hack\/\" target=\"_blank\">The Download on the DNC Hack<\/a>, Fomenko issued a statement in response to being implicated in the ThreatConnect and FBI reports.\u00a0Fomenko&#8217;s statement &#8212; written in Russian &#8212; said he did not know the identity of the hackers who used his network to attack U.S. election-related targets, but that those same hackers still owed his company USD $290 in unpaid server bills.<\/p>\n<p>A English-language translation of that statement was <a href=\"https:\/\/chronopay.com\/blog\/2016\/09\/15\/chronopay-pomogaet-king-servers-com\/\" target=\"_blank\">simultaneously published<\/a> on <strong>ChronoPay.com<\/strong>, Vrublevsky&#8217;s payment processing company.<\/p>\n<p>\u201cThe analysis of the internal data allows King Servers to confidently refute any conclusions about the involvement of the Russian special services in this attack,\u201d Fomenko said in his statement, which credits ChronoPay for the translation.\u00a0\u201cThe company also reported that the attackers still owe the company $US290 for rental services and King Servers send an invoice for the payment to Donald Trump &amp; Vladimir Putin, as well as the company reserves the right to send it to any other person who will be accused by mass media of this attack.\u201d<\/p>\n<div id=\"attachment_37849\" style=\"width: 211px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-37849\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/vrub-jan27.png\" alt=\"ChronoPay founder and owner Pavel Vrublevsky.\" width=\"201\" height=\"331\" \/><\/p>\n<p class=\"wp-caption-text\">ChronoPay founder and owner Pavel Vrublevsky.<\/p>\n<\/div>\n<p>I mentioned Vrublevsky in that story because I knew Fomenko (a.k.a. &#8220;<a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/KingServersCrutop.png\" target=\"_blank\">Die$el<\/a>&#8220;) and he were longtime associates; both were prominent\u00a0members of <strong>Crutop[dot]nu<\/strong>, a cybercrime forum that Vrublevsky (a.k.a. &#8220;<a href=\"https:\/\/krebsonsecurity.com\/2011\/06\/organization-chart-reveals-chronopay%E2%80%99s-links-to-shady-internet-projects\/\" target=\"_blank\">Redeye<\/a>&#8220;) owned and operated for years. In addition, I recognized Vrublevsky&#8217;s voice and dark humor in the statement, and thought it was interesting that Vrublevsky was inserting himself into all the alleged election-hacking drama.<\/p>\n<p>That story also noted\u00a0how common it was for Russian intelligence services to recruit Russian hackers who were already in prison &#8212; by commuting their sentences in exchange for helping the government hack foreign adversaries. In 2013, Vrublevsky was <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwj1gdq6-OXRAhUTziYKHRjVC0kQFggbMAA&amp;url=https%3A%2F%2Fkrebsonsecurity.com%2F2013%2F08%2Fpavel-vrublevsky-sentenced-to-2-5-years%2F&amp;usg=AFQjCNF3oRge-uitJfeLr0cTLQb8GbOGMg&amp;sig2=-cUyK7-I7swu7YY6JZyYBg&amp;bvm=bv.145822982,d.eWE\" target=\"_blank\">convicted<\/a> of <a href=\"https:\/\/krebsonsecurity.com\/2012\/06\/who-is-the-festi-botmaster\/\" target=\"_blank\">hiring his most-trusted spammer<\/a> and malware writer to attack one of ChronoPay&#8217;s chief competitors, but he was inexplicably released a year earlier than his two-and-a-half year sentence required.<\/p>\n<p>Meanwhile, the malware author that Vrublevsky hired to launch the attack which later landed them both in jail <a href=\"https:\/\/www.nytimes.com\/2016\/12\/29\/world\/europe\/how-russia-recruited-elite-hackers-for-its-cyberwar.html?_r=0\" target=\"_blank\">told <em>The New York Times<\/em><\/a>\u00a0last month that he&#8217;d also been approached while in prison by someone offering to commute his sentence if he agreed to hack for\u00a0the Russian government, but that he&#8217;d refused and was forced to serve out his entire sentence.<\/p>\n<p>My book <em>Spam Nation<\/em> <a href=\"https:\/\/krebsonsecurity.com\/?s=pharma+wars+botmaster&amp;x=0&amp;y=0\" target=\"_blank\">identified most of the world&#8217;s top spammers and virus writers by name<\/a>, and\u00a0I couldn&#8217;t have done that had someone in Russian law enforcement not leaked to me and to the FBI tens of thousands of email messages and documents <a href=\"https:\/\/krebsonsecurity.com\/2010\/12\/russian-e-payment-giant-chronopay-hacked\/\" target=\"_blank\">stolen<\/a> from ChronoPay&#8217;s offices.<\/p>\n<p>To this day I don&#8217;t know the source of those stolen documents and emails. They included spreadsheets chock full of bank account details tied to some of the world&#8217;s most active cybercriminals, and to <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/11\/CPcompanies.png\" target=\"_blank\">a vast network of shell corporations<\/a> created by Vrublevsky and ChronoPay to <a href=\"https:\/\/krebsonsecurity.com\/2010\/05\/following-the-money-part-ii\/\" target=\"_blank\">help launder the proceeds from his pharmacy, spam and fake antivirus operations<\/a>.<\/p>\n<p>Fast-forward to this past week: Multiple Russian media outlets covering the treason case\u00a0<a href=\"https:\/\/www.novayagazeta.ru\/articles\/2017\/01\/26\/71296-troyanskiy-kod\" target=\"_blank\">mention<\/a> that King-Servers and its owner Fomenko rented the servers from a Dutch company controlled by Vrublevsky.<\/p>\n<p>Both Fomenko and Vrublevsky deny this, but the accusations got me looking more deeply through my huge cache of leaked ChronoPay emails for any mention of Mikhaylov or Stoyanov &#8212; the cybercrime investigators arrested in Russia last week and charged with treason. I also looked because in phone interviews in 2011 Vrublevsky told me he suspected both men were responsible for leaking his company&#8217;s emails to me, to the FBI, and to <strong>Kimberly Zenz<\/strong>, a senior\u00a0threat analyst who works for the security firm\u00a0<strong>iDefense\u00a0<\/strong>(now owned by <strong>Verisign<\/strong>).<\/p>\n<p>In that conversation, Vrublevsky said he was convinced that Mikhaylov was taking information gathered by Russian government cybercrime investigators and feeding it to U.S. law enforcement and intelligence agencies and to Zenz. Vrublevsky told me then that if ever he could prove for certain Mikhaylov was involved in leaking incriminating data on ChronoPay, he would have someone &#8220;tear him a new asshole.&#8221;<\/p>\n<p>As it happens, an email that Vrublevsky wrote to a ChronoPay employee in 2010 eerily presages the arrests of Mikhaylov and Stoyanov,\u00a0voicing Vrublevsky&#8217;s suspicion that the two men were closely involved in leaking ChronoPay emails and documents <em>that were seized by Mikhaylov&#8217;s own division<\/em> &#8212; the <strong>Information Security Center<\/strong> (CDC) of the Russian <strong>Federal Security Service<\/strong> (FSB). A copy of that email is shown in Russian in the screen shot below. A translated version of the message text is available\u00a0<a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/CPemailtranslated.pdf\" target=\"_blank\">here<\/a>\u00a0(PDF).<\/p>\n<div id=\"attachment_37811\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-37811 size-medium\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh-580x214.png\" alt=\"A copy of an email Vrublevsky sent to a ChronoPay co-worker about his suspicions that Mikhaylov and Stoyanov were leaking government secrets.\" width=\"580\" height=\"214\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh-580x214.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh-768x283.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh-940x346.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/Psha-mikh.png 1276w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">A copy of an email Vrublevsky sent to a ChronoPay co-worker about his suspicions that Mikhaylov and Stoyanov were leaking government secrets.<\/p>\n<\/div>\n<p>In it, Vrublevsky claims Zenz was dating a Russian man who worked with Stoyanov at Indrik &#8212; the company that both men worked at before joining Kaspersky &#8212; and that Stoyanov was feeding her privileged\u00a0information about important Russian hackers.<\/p>\n<p>&#8220;Looks like Sergey and Ruslan were looking for various &#8216;scapegoats&#8217; who were easy to track down and who had a lot of criminal evidence collected against them, and then reported them to iDefense through Kimberly,&#8221; Vrublevsky wrote to a ChronoPay subordinate in an email dated Sept. 11, 2010. &#8220;This was done so that iDefense could get some publicity for themselves by turning this into a global news story. Then the matter was reported by US intelligence to Russia, and then got on Sergey&#8217;s desk who made a big deal out of it and then solved the case brilliantly, gaining favors with his bosses. iDefense at the same time was getting huge grants to fight Russian cyberthreats.&#8221;<\/p>\n<p>Based on how long Vrublevsky has been <a href=\"http:\/\/www.redeye-blog.com\/news\/eng\/fsbcibsereja-eto-prosto-kladez-znanij-kakoj-to.html\" target=\"_blank\">trying to sell this narrative<\/a>, it seems he\u00a0may have <a href=\"https:\/\/krebsonsecurity.com\/2011\/08\/pharma-wars-purchasing-protection\/\" target=\"_blank\">finally found a buyer<\/a>.<\/p>\n<p>Verisign&#8217;s Zenz said she did date a Russian man who worked with Stoyanov, but otherwise called Vrublevsky&#8217;s accusations a fabrication. Zenz said she&#8217;s uncertain if Vrublevsky has enough political clout to somehow influence the filing of a treason case against the two men, but that she suspects the case has more to do with ongoing and very public recent infighting within the Russian FSB.<\/p>\n<p>\u201cIt is hard for me imagine how Vrublevsky would be so powerful as to go after the people that investigated him on his own,&#8221; Zenz told KrebsOnSecurity. &#8220;Perhaps the infighting going on right now among the security forces already weakened Mikhaylov enough that Vrublevsky was able to go after him. Leaking communications or information to the US is a very extreme thing to have done. However, if it really did happen, then Mikhaylov would be very weak, which could explain how Vrublevsky would be able to go after him.\u201d<\/p>\n<p>Nevertheless, Zenz said, the Russian government&#8217;s treason case against Mikhaylov and Stoyanov is likely to have a chilling effect on the sharing of cyber threat information among researchers and security companies, and will almost certainly create problems for Kaspersky&#8217;s image abroad.<\/p>\n<p>\u201cThis really weakens the relationship between Kaspersky and the FSB,&#8221; Zenz said. &#8220;It pushes Kaspersky to formalize relations and avoid the informal cooperation upon which cybercrime investigations often rely, in Russia and globally. It is also likely to have a chilling effect on such cooperation in Russia. This makes people ask, \u201cIf I share information on an attack or malware, can I be charged with treason?&#8217;\u201d<\/p>\n<p>Vrublevsky declined to comment for this story. King Servers&#8217; Fomenko could not be immediately reached for comment.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/01\/a-shakeup-in-russias-top-cybercrime-unit\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/01\/mikhaylov.png\"\/><br \/>A chief criticism I heard from readers of my book, Spam Nation: The Inside Story of Organized Cybercrime, was that it dealt primarily with petty crooks involved in petty crimes, while ignoring more substantive security issues like government surveillance and cyber war. But now it appears that the chief antagonist of Spam Nation is at the dead center of an international scandal involving the hacking of U.S. state electoral boards in Arizona and Illinois, the sacking of Russia&#8217;s top cybercrime investigators, and the slow but steady leak of unflattering data on some of Russia&#8217;s most powerful politicians.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11126,11127,6627,11128,11129,11130,11131,3493,11132,10655,10644,11133,11134,11135,10659,10662,11136],"class_list":["post-6422","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-chronopay","tag-crutop","tag-fbi","tag-fsb","tag-humpty-dumpty","tag-idefense","tag-indrik","tag-kaspersky-lab","tag-kimberly-zenz","tag-king-servers","tag-other","tag-pavel-vrublevsky","tag-ruslan-stoyanov","tag-sergey-mikhaylov","tag-spam-nation","tag-threatconnect","tag-11136"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6422"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6422\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6422"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}