Crypto Prices

U.S. Government Accuses Ukrainian Suspect of Involvement in Russian Cybercrime with Cryptocurrency Ties

5 days ago
1 min read
12 views

Legal Proceedings Against Victoria Dubranova

The United States Department of Justice (DoJ) has initiated legal proceedings against Victoria Eduardovna Dubranova, a 33-year-old individual from Ukraine, who is suspected of facilitating operations for two Russian-backed hacking collectives known as CyberArmyofRussia_Reborn (CARR) and NoName. Dubranova was extradited to the U.S. earlier in the year and is facing multiple charges linked to her alleged role in various high-profile cyberattacks targeting essential infrastructure and other entities globally.

Charges and Allegations

The charges against her include conspiracy to damage protected computers, as stated in both indictments. Specifically, the indictment associated with CARR also accuses her of:

  • Tampering with public water systems
  • Committing access device fraud
  • Aggravated identity theft

Reports suggest these cyberattack groups received financial backing from the Russian government, which funded their malicious activities including subscription services for DDoS attacks. CARR reportedly employed its funds to access DDoS-as-a-service platforms while NoName managed to innovate its own DDoS software.

Cyber Operations and Impact

CARR has executed various cyber operations, such as:

  • Endangering public drinking water systems across multiple U.S. states
  • Assaulting a meat processing facility in Los Angeles in November 2024
  • Infiltrating U.S. election infrastructure

Separately, NoName claims to have conducted cyberattacks on a global scale, affirming its operations via public channels such as Telegram where they also advertised for new members and listed the most active attackers, compensating them in cryptocurrency.

Trial Dates and Potential Sentences

Dubranova’s upcoming trial related to NoName is scheduled for February 3, while her case concerning CARR is set to commence on April 7. If convicted of the charges stemming from CARR, she could be sentenced to a maximum of 27 years, with an additional five years possible for her involvement with NoName.

Cryptocurrency and Law Enforcement

Though the DoJ’s indictment does not elaborate on the specifics of cryptocurrency’s utilization by these groups, it has been revealed that both CARR and NoName directed a portion of their donations toward the acquisition of the infrastructure necessary for executing DDoS attacks. Jacqueline Burns-Koven, Head of Cyber Threat Intelligence at Chainalysis, emphasized that while the funds raised from donations and campaigns might not be ample, any trail of cryptocurrency can significantly aid law enforcement in tracking down criminal activities.

Impact of Sanctions and Legal Actions

The existing sanctions against CARR, coupled with this indictment, are expected to intensify restrictions against pro-Russia cyber operations. Burns-Koven noted that these legal actions complicate donations to such groups and obstruct their ability to launder funds, as blockchain analytics can reveal financial transactions.

Conclusion

Despite the potential for new hacking factions to emerge as old ones fade, the apprehension and public exposure of individuals associated with these groups can serve as a deterrent while simultaneously creating mistrust among remaining operatives. For instance, CARR’s past partnerships with hacktivist groups serve as a notable warning regarding the repercussions of involvement in such cyber endeavours.

Popular