I’d assumed that participating in their documentary would involve sitting for a few interviews about known historical facts related to the breach. What stood out about the inquiry from Wall to Wall was that their researchers had already gathered piles of clues about the breach that I’d never seen before. I’m aware that there are multiple studios working on Ashley Madison documentaries because I broke the story of the breach in 2015, and all of those production houses approached me with essentially the same pitch: It would be a shame if your voice wasn’t included in our project. It’s impossible to say how many users lost their jobs or marriages as a result of the breach. The leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. On July 19, 2015, a hacker group calling itself The Impact Team leaked Ashley Madison internal company data, and announced it would leak all user data in a month unless Ashley Madison voluntarily shut down before then.Ī month later, The Impact Team published more than 60 gigabytes of data, including user names, home addresses, search history, and credit card transaction records. There are several other studios pursuing documentaries on the Ashley Madison breach, and it’s not hard to see why. “Featuring exclusive footage and untold firsthand interviews from those involved, the series will explore infidelity, morality, cyber-shaming and blackmail and tell the story of ordinary people with big secrets and a mystery that remains unsolved to this day,” reads a Jan. International Television Production group. Wall to Wall Media is part of the Warner Bros. The new docuseries produced by ABC News Studios and Wall to Wall Media is tentatively titled, “ The Ashley Madison Affair,” and is slated for release on Hulu in late Spring 2023. While I can’t predict what the producers will do with the video interviews we shot, it’s fair to say the series will explore compelling new clues as to who may have been responsible for the attack. KrebsOnSecurity will likely have a decent amount of screen time in an upcoming Hulu documentary series about the 2015 megabreach at marital infidelity site Ashley Madison. The article cited sources close to the investigation who said the film studio was operating as a money-laundering front for the cybercrooks behind Dyre. federal investigators say was the precursor to the Trickbot malware. In February 2016, Reuters reported that the raid was connected to a crackdown on “ Dyre,” a sophisticated trojan that U.S. Kovalev’s Botnet film project was disrupted after Russian authorities raided the film production company’s offices as part of a cybercrime investigation. She was among 37 alleged mules charged with aiding an international cybercrime operation - basically, setting up phony corporate bank accounts for the sole purpose of laundering stolen funds.Īlthough she possessed no real hacking skills, Svechinskaya’s mugshot and social media photos went viral online and she was quickly dubbed “the world’s sexiest computer hacker” by the tabloids. Svechinskaya was one of Bentley’s money mules, most of whom were young Russian students on temporary travel visas in the United States. In 2015, Kovalev reportedly began filming a movie in Russia about cybercrime called “ Botnet.” According to a 2016 story from, Botnet’s opening scene was to depict the plight of Christina Svechinskaya, a Russian student arrested by FBI agents in September 2010.Ĭhristina Svechinskaya, a money mule hired by Bentley who was arrested by the FBI in 2010. The 2012 indictment against Kovalev relates to cybercrimes he allegedly perpetrated prior to the creation of Trickbot. Secret Service determined that he ran a massive “money mule” scheme, which used phony job offers to trick people into laundering money stolen from hacked small to mid-sized businesses in the United States. According to the Treasury Department, the alleged senior leader of the Trickbot group is 34-year-old Russian national Vitaly “Bentley” Kovalev.Ī New Jersey grand jury indicted Kovalev in 2012 after an investigation by the U.S. Only one of the men sanctioned today is known to have been criminally charged in connection with hacking activity. Members of the Trickbot Group publicly gloated over the ease of targeting the medical facilities and the speed with which the ransoms were paid to the group.” “In one of these attacks, the Trickbot Group deployed ransomware against three Minnesota medical facilities, disrupting their computer networks and telephones, and causing a diversion of ambulances. “During the height of the COVID-19 pandemic in 2020, Trickbot targeted hospitals and healthcare centers, launching a wave of ransomware attacks against hospitals across the United States,” the sanctions notice continued. A spam email from 2020 containing a Trickbot-infected attachment.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |