Cybercrime , Fraud Management & Cybercrime , Ransomware

Trickbot Developer Pleads Guilty in US Court

Vladimir Dunaev Faces Up to 35 Years in Prison
Trickbot Developer Pleads Guilty in US Court

A Russian national pleaded guilty in U.S. federal court for his role in developing Trickbot. Operators of the malware targeted hospitals and healthcare centers with ransomware attacks during the height of the novel coronavirus pandemic.

See Also: OnDemand | 2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk

Vladimir Dunaev, 40, pleaded guilty in the U.S. District Court for the District of Northern Ohio on Thursday to one count of conspiracy to commit computer fraud and aggravated identity theft and one count of conspiracy to commit wire and bank fraud. His sentencing is set for Jan. 26, and he faces up to 35 years in prison.

South Korea extradited Dunaev in late 2021. Federal prosecutors said he had overseen the creation of the malware's browser injection, machine identification and data harvesting functions. Among the victims of Trickbot are three Minnesota medical facilities that were forced to turn away emergency patients as a result of the ransomware attacks. Prosecutors said that during Dunaev’s participation in the Trickbot operation, victims also included 10 organizations in northern Ohio, "including Avon schools and a North Canton real estate company," which "were defrauded of more than $3.4 million via ransomware deployed by Trickbot."

Dunaev was prosecuted alongside Alla Witte, a Latvian national arrested in 2021, as was Dunaev, and accused by prosecutors of working as a Trickbot developer on the control and deployment of ransomware, obtaining extortion payments and developing software tools to store stolen credentials. Witte pleaded guilty in June to conspiracy to commit computer fraud and was sentenced to two years and eight months in prison.

Trickbot was absorbed in 2021 by the now-defunct Conti ransomware-as-a-service group. Conti's operators spun off into multiple groups in May 2022, and some of those groups continue to use Trickbot-derived code.

British and American authorities have said the group cultivated ties to Russian intelligence and received tasking orders from the Kremlin.

Security researchers first identified Trickbot in 2016 and monitored its evolution from a variant of an earlier banking Trojan dubbed Dyre or Dyreza into a vector for Conti and Ryuk ransomware. The Washington Post reported in 2020 that U.S. Cyber Command had mounted an operation to disrupt the Trickbot botnet ahead of the American presidential election to head off potential ransomware attacks on state or local voter registration offices.

As with many types of malware, Trickbot's operators refined their code to add additional capabilities and meet changing criminal demands. Updates included making the malware serve as a dropper - a tool for downloading additional software onto an endpoint it had infected. It also gained web injection capabilities, allowing it to spoof legitimate banks and cryptocurrency exchanges.

Prosecutors unsealed charges against other members of the Trickbot operation in September and February, in tandem with announcing sanctions imposed by the United States and the United Kingdom.


About the Author

David Perera

David Perera

Editorial Director, News, ISMG

Perera is editorial director for news at Information Security Media Group. He previously covered privacy and data security for outlets including MLex and Politico.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.