I assume this works where the ransomware authors, who likely are in some untouchable nation and the son of some major politician, provide a binary/kit with their own addresses to take the ransom then pay the person who planted it out minus their cut. Those wallets used for paying crime commissions are probably reused often or otherwise identified as they don't care if you get caught and you need to either sit on those coins for years until the limitations runs out or have enough knowledge to (correctly) wash them and anyone doing this is already making bad life decisions so likely greedy and cashed those in a traceable way like driving to work in his new Ferrari.
by ekjhgkejhgk
2 subcomments
I don't usually open court documents, so I have no idea what to expect. But I notice that there's no description of evidence. Is this because they weren't sentenced yet? Or what? Will we be able to see how they were caught?
by spcharc
1 subcomments
Who needs hackers if you have IT experts like this
by fathermarz
1 subcomments
There is an ongoing trend that sees insider threats becoming more prevalent in critical systems, than external “adversarial” attacks.