- Advertisement -
- Gangexposed leaks sensitive information and PII on important ransomware figures
- Among them are strict and professor
- The identity of Stern was confirmed by the German police
A mysterious leaker has been seen, revealed the identities of some of the world’s most wanted cyber criminals, including the brain behind Conti and Trickbot Ransomware, notorious groups responsible for some of the greatest extortion in modern history.
Recently, The register Speaked with an anonymous person who has the alias Gangexposed, who said they are on a personal mission to “fight against an organized society of criminals who are known worldwide”.
“I like to think that I can rid society of at least some of them,” said Gangexposed. “I just enjoy solving the most complex cases.”
Doxxing Stern
One of the people they did are Doxxx is Stern, the leader of Trickbot and Conti ransomware edits. They claim that Stern is actually a Vitaly Nikolaevich Kovalev, a 36-year-old Russian national. His identity was later confirmed by the German police.
“The subject is suspected of being the founder of the ‘Trickbot’ group, also known as ‘Wizard Spider’,” The Federal Criminal Police Office of Germany said recently. “The group used the Trickbot Malware and other malware variants such as Bazarloader, SystemBC, Icedid, Ryuk, Conti and Diavol.”
Shortly thereafter, Gangexposed another key figure, also known as Professor. Behind this alias, they claim, is a 39-year-old Russian named Vladimir Viktorovich Kvitko. Kvitko is said to live in Dubai.
In addition to naming key figures, Gangexposed leaked chat logs, videos and ransom negotiations.
The Leaker claims not to be a “IT man” and that the methodology depends on observing patterns that others have missed:
“My toolkit includes classical intelligence analysis, logic, factual research, osint methodology, stylometry (I am a linguistic and philologist), human psychology and the ability to combine puzzles that others don’t even notice,” she said the publication.
“I am a cosmopolitan with many houses, but not a permanent basis – I move if necessary. My privacy standards are often stricter than those of most of my studies.”
To discover the identities of infamous cyber criminals, they used data obtained via “Semi-closed databases, darknet services (for investigating state records through corrupt officials), and I often buy information. I have access to the leaked FSB boundary database,” they added to $ 9. “
An interesting detail is that they could have claimed at least $ 10 million to Bounty from the FBI, but apparently have decided to be against it – leading some media to speculate that they are a dissatisfied former member, simply looking for revenge, while others believe that grabbing the premium could also accuse themselves.
Maybe you like it too
- Advertisement -