Who wouldn’t want to earn $2.5 million?
That’s the reward the U.S. State Department and Secret Service are offering for information leading to the arrest and/or conviction of a Belarusian man alleged to have been a key figure behind the development and distribution of the infamous Angler Exploit Kit.
Vladimir Kadariya, 38, is accused of numerous cybercrimes that have defrauded millions of Internet users through malvertising and other means since at least October 2013.
The malvertising campaigns were designed to appear legitimate, but often redirected affected Internet users who viewed or accessed the ads to malicious websites and servers that attempted to defraud users or deliver malware to users’ devices. The Angler Exploit Kit was a leading means by which malware was delivered to compromised electronic devices.
Kadariya, who reportedly used pseudonyms such as “Stalin,” “Eseb,” and “Baxus” online, was charged in June 2023. However, the charges were not made public until this month, when he was identified as a co-conspirator of alleged ransomware boss Maksim Silnikau (also known as “JP Morgan”).
Over the years, the Angler Exploit Kit has infected many millions of computer users with malware that was often distributed via manipulated ads on all sorts of websites – from the most visited adult websites to celebrity gossip sites to TMZ And Perez Hiltonand even an article in The Guardian and asks (ironically) whether cybercrime is out of control.
Kadariya is also suspected of being involved in carrying out “scareware” attacks, which trick Internet users into believing that their computers are infected with malware or have other problems that require urgent attention. Unsuspecting victims are tricked into purchasing or downloading malicious software, granting remote access to their PC to malicious hackers, or revealing personal information.
Victims of such attacks could be monetized in a number of ways. For example, users’ banking information and login credentials could be stolen and sold to scammers via cybercrime forums. In addition, compromised PCs could be incorporated into botnets that could be further exploited.
Kadariya’s whereabouts are currently unknown.
Anyone interested in claiming a share of the $2.5 million reward would be well advised to contact U.S. intelligence with information that could lead to Kadariya’s capture.
Alternatively, individuals outside the United States are asked to contact the nearest U.S. embassy or consulate.
Editor’s note: The opinions expressed in this and other articles by guest authors are solely those of the author and do not necessarily reflect the views of Tripwire.