27.2 C
New York
Saturday, September 6, 2025

US presents $10 million bounty for information on Russian FSB hackers


US presents  million bounty for information on Russian FSB hackers

The U.S. Division of State is providing a reward of as much as $10 million for data on three Russian Federal Safety Service (FSB) officers concerned in cyberattacks focusing on U.S. crucial infrastructure organizations on behalf of the Russian authorities.

The three people, Marat Valeryevich Tyukov, Mikhail Mikhailovich Gavrilov, and Pavel Aleksandrovich Akulov, are a part of the FSB’s Heart 16 or Army Unit 71330, which is tracked as Berserk Bear, Blue Kraken, Crouching Yeti, Dragonfly, and Koala Staff.

In March 2022, the three FBS officers had been additionally charged for his or her involvement in a marketing campaign that befell between 2012 and 2017, focusing on U.S. authorities businesses, together with the Nuclear Regulatory Fee, in addition to power firms like Wolf Creek Nuclear Working Company, which operates a nuclear energy plant in Burlington, Kansas.

“For data on three Russian FSB officers who performed malicious cyber actions towards U.S. crucial infrastructure on behalf of the Russian authorities. These officers additionally focused greater than 500 international power firms in 135 different international locations,” the State Division tweeted on Tuesday.

“If in case you have data on their actions, contact Rewards for Justice by way of the Tor-based tips-reporting channel [..] You could possibly be eligible for a reward and relocation.”

Rewards for Justice poster
Rewards for Justice poster (U.S. State Division)

Extra lately, because the FBI warned in August, they exploited the CVE-2018-0171 vulnerability in end-of-life Cisco networking gadgets over the previous yr to breach firms throughout U.S. crucial infrastructure sectors by remotely executing arbitrary code on unpatched gadgets.

Cisco, which first detected CVE-2018-0171 assaults nearly 4 years in the past, in November 2021, up to date its advisory and urged community admins and safety groups to patch their gadgets towards assaults as quickly as attainable.

The networking large’s cybersecurity division, Cisco Talos, reported that the Russian state-sponsored hacking group has been aggressively exploiting this safety vulnerability to breach unpatched gadgets belonging to telecommunications, greater training, and manufacturing organizations throughout North America, Europe, Asia, and Africa.

The identical Russian risk group is understood for attacking U.S. state, native, territorial, and tribal (SLTT) authorities organizations and aviation entities over the past decade.

In June, the U.S. State Division additionally introduced a reward of as much as $10 million for data on state hackers tied to the RedLine infostealer malware operation and its suspected creator, Russian nationwide Maxim Alexandrovich Rudometov.

46% of environments had passwords cracked, almost doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and knowledge exfiltration developments.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles