DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Cops Are Just Trolling Cybercriminals Now

Posted on May 28, 2024 by Dissent

Matt Burgess reports:

Russian cybercriminals are almost untouchable. For years, hackers based in the country have launched devastating ransomware attacks against hospitals, critical infrastructure, and businesses, causing billions in losses. But they’re out of reach of Western law enforcement and largely ignored by the Russian authorities. When police do take the criminals’ servers and websites offline, they’re often back hacking within weeks.

Now investigators are increasingly adding a new dimension to their disruption playbook: messing with cybercriminals’ minds. To put it bluntly, they’re trolling the hackers.

In recent months, Western law enforcement officials have turned to psychological measures as an added way to slow down Russian hackers and cut to the heart of the sweeping cybercrime ecosystem. These nascent psyops include efforts to erode the limited trust the criminals have in each other, driving subtle wedges between fragile hacker egos, and sending offenders personalized messages showing they’re being watched.

Read more at WIRED.

Comments by DataBreaches

The article is timely, especially in light of BreachForum’s recent but short-lived takedown. Law enforcement seemed to encounter some difficulties in keeping control of the domain. As of this morning, BreachForums is back online and accepting new registrations and posts. If this was just a psyops operation, it may have unnerved a few people, but overall, how successful was this?  The forum is not a honeypot at this point (unless ShinyHunters’ account was taken over or ShinyHunters became a federal agent). Can law enforcement seize BreachForums again? It seems likely. But given that CloudFlare canceled coverage, the forum is also vulnerable to DDoS attacks if law enforcement wants to disrupt it that way.

Can law enforcement say, “Oh, well, we just want ShinyHunters to think they got away with something so they take more risks?”  Possibly, but….?

That said, DataBreaches is aware of at least one individual who was so scared by law enforcement’s personalized message that they followed up with law enforcement. DataBreaches is also aware of a few others who, in the past year, have decided that it was time for them to get out of cybercrime and who reached out to law enforcement to see if they could make some deal. So there is some evidence that what law enforcement is doing is having some effect on some individuals.

Over on Infosec.exchange, @cR0w commented:

The Wired article on LEAs using PSYOPS tactics is cool and all, but the feds should not be lauded for transitioning to the long game while their failure to implement physical disruption has directly enabled continued #ransomware attacks on hospitals and utilities. “Trolling” while people die is not a sufficient response.

DataBreaches would add that it’s not just ransomware. Law enforcement does not seem to have any effective or disruptive response to DDoS attacks.

People can also die when threat actors hit hospitals or critical infrastructure with powerful and sustained attacks. DataBreaches has been in contact with the FBI since the attacks on this site first began in March. To date, they have done nothing really helpful other than commiserating.  If the same DDoSer hits a hospital with the power of the botnet being used against this site, what will law enforcement do then?

 

Category: BlogCommentaries and AnalysesMalwareOf NotePhishing

Post navigation

← Japan Man Arrested for Creating Virus Using Generative AI Systems; ‘I Thought I Could Do Anything if I Asked AI’
Hacked? Ticketmaster’s terrible, horrible, no good, very bad week just got worse →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.