NBC News reports that Russian businessman Vladislav Klyushin, who owns information technology firm M-13 that has links to the Russian government, was found guilty by the U.S. of conspiracy, wire fraud, and other charges in relation to his involvement in a hack-and-trade scheme that led to the theft of $90 million from U.S. companies.
Hundreds of publicly traded firms had their earnings data exfiltrated through computer hacking by Klyushin and his co-conspirators, who then leveraged the information to profit from trades, according to prosecutors.
"The jury saw Mr. Klyushin for exactly what he is a cybercriminal and a cheat. He repeatedly gamed the system and finally got caught. Now he is a convicted felon," said U.S. Attorney for Massachusetts Rachael Rollins.
Klyushin, who could be imprisoned for over 50 years for the charges, will receive his sentence on May 4. Meanwhile, Russian intelligence operative Ivan Ermakov, who was among the perpetrators of the 2016 Democratic National Committee hack, and his other co-conspirators are still at large.
Numerous government, political, and academic organizations in South Korea have been targeted by the Chinese state-backed advanced persistent threat operation TAG-74 as part of a "multi-year" cyberespionage campaign part of China's intellectual property theft and influence operations, The Hacker News reports.
BleepingComputer reports that vulnerable Openfire messaging servers impacted by the already addressed high-severity authentication bypass flaw, tracked as CVE-2023-32315, are being subjected to ongoing attacks aimed at ransomware encryption and cryptominer distribution.
Ukraine's Prosecutor General's Office and other departments involved in war crimes documentation have been facing mounting cyberattacks from Russian state-sponsored threat operations looking to obtain evidence regarding such crimes, which is a sharp contrast from the previous targeting of energy facilities, Reuters reports.