On-Prem

Public Sector

WhisperGate suspect indicted as US offers a $10M bounty for his capture

Russian national accused of attacks in lead-up to the Ukraine war


The US Department of Justice has indicted a 22-year-old Russian for allegedly attacking Ukrainian government computers and destroying critical infrastructure systems in the so-called “WhisperGate” wiper attack that preceded Russia's illegal invasion of the European nation.

If convicted, Amin Timovich Stigal faces a maximum penalty of five years in prison. In addition to the indictment, handed down by a federal grand jury in Maryland on Tuesday, the US State Department today offered a reward of up to $10 million for information on Stigal's location and alleged cyber crimes.

"As alleged, the defendant conspired with Russian military intelligence on the eve of Russia's unjust and unprovoked invasion of Ukraine to launch cyber attacks targeting the Ukrainian government and later targeting its allies, including the United States," US attorney general Merrick Garland declared in a statement.

If you can see this man, and get him to the authorities, then $10 million could be yours – Click to enlarge

Stigal and others first conspired with Russia's GRU military intelligence unit on the cyber attacks in January 2022 – a month before the full-scale invasion of Ukraine – according to court documents.

in that month, actors that Ukraine's government alleged operated from Belarus deployed a strain of data-destroying malware, later dubbed WhisperGate, on "dozens" of Ukrainian targets. The attacks hit critical infrastructure networks including government agencies, military and defense, as well as in agriculture, education, science and emergency service organizations.

"The Conspirators used software that was designed to appear as if the computers had suffered a ransomware attack, when in fact the data on the computers had been deleted," the indictment states [PDF].

In May 2022, the US and some allies attributed the WhisperGate attack to the Russian military. Microsoft's Threat Intelligence unit named the group "Cadet Blizzard" and linked it to the GRU.

In addition to dropping the info-destroying malware, the criminals defaced government websites, snooped through online systems, and stole personal data – such as medical records – belonging to thousands of Ukrainians.

"The purpose of the attack was, in part, to sow concern among Ukrainian citizens regarding the safety of their Government's systems and their personal data in advance of the Russian attack of Ukraine," according to the court papers.

Russia is also accused of breaking into an unnamed Central European country's infrastructure in October 2022, as well as probing US systems – including "multiple sites maintained by a US Government Agency located in Maryland."

To cover their tracks and conceal their Russian government ties, the criminals used fake identities and infrastructure located in the US and elsewhere, we're told. ®

Send us news
6 Comments

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud