{"id":26664,"date":"2020-07-30T17:43:21","date_gmt":"2020-07-30T14:43:21","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=26664"},"modified":"2025-08-26T15:45:50","modified_gmt":"2025-08-26T12:45:50","slug":"belarusian-accused-of-distributing-ransomware-that-demanded-ransom-in-dash","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/belarusian-accused-of-distributing-ransomware-that-demanded-ransom-in-dash\/","title":{"rendered":"Belarusian accused of distributing ransomware that demanded ransom in DASH"},"content":{"rendered":"<p><span style=\\\"font-weight: 400;\\\">A Gomel resident is suspected of involvement with a hacker group that distributed the GandCrab ransomware and demanded a ransom in the cryptocurrency <\/span><span style=\\\"font-weight: 400;\\\">DASH<\/span><span style=\\\"font-weight: 400;\\\">. According to the Belarusian Ministry of Internal Affairs&#8217; website.<\/span><!--more--><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Authorities say the suspect infected more than a thousand computers with the ransomware. For decrypting the data, he demanded about $1,200 in cryptocurrency. His victims included users from hundreds of countries, including the United States, India, EU member states, Ukraine and Russia.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Typically, hackers demanded a ransom of between $400 and $1,500. If payment was not made within the indicated period, the amount doubled.<\/span><\/p>\n<p>\\n<\/p>\n<p><img loading=\\\"lazy\\\" decoding=\\\"async\\\" class=\\\"aligncenter wp-image-106010\\\" src=\\\"https:\/\/u1f987.com\/wp-content\/uploads\/gandcrab-decryptor-site-300x257.jpg\\\" alt=\\\"\u0411\u0435\u043b\u043e\u0440\u0443\u0441\u0430 \u043e\u0431\u0432\u0438\u043d\u0438\u043b\u0438 \u0432 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u0432\u0438\u0440\u0443\u0441\u0430-\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430, \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b \u0432\u044b\u043a\u0443\u043f \u0432 DASH\\\" width=\\\"820\\\" height=\\\"703\\\" srcset=\\\"https:\/\/u1f987.com\/wp-content\/uploads\/gandcrab-decryptor-site-300x257.jpg 300w, https:\/\/u1f987.com\/wp-content\/uploads\/gandcrab-decryptor-site-768x658.jpg 768w, https:\/\/u1f987.com\/wp-content\/uploads\/gandcrab-decryptor-site.jpg 896w\\\" sizes=\\\"auto, (max-width: 820px) 100vw, 820px\\\" \/><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">According to available data, altogether criminals, active in 2017-2018, distributed GandCrab to more than 54 thousand computers worldwide. <\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Total earnings from the illicit activity amounted to over $2 billion, the hackers reported on one of the darknet forums. <\/span><\/p>\n<p>\\n<\/p>\n<p><img loading=\\\"lazy\\\" decoding=\\\"async\\\" class=\\\"aligncenter wp-image-106009\\\" src=\\\"https:\/\/u1f987.com\/wp-content\/uploads\/Soobshhenie-na-forume-300x121.jpg\\\" alt=\\\"\u0411\u0435\u043b\u043e\u0440\u0443\u0441\u0430 \u043e\u0431\u0432\u0438\u043d\u0438\u043b\u0438 \u0432 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u0432\u0438\u0440\u0443\u0441\u0430-\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430, \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u0432\u0448\u0435\u0433\u043e \u0432\u044b\u043a\u0443\u043f \u0432 DASH\\\" width=\\\"820\\\" height=\\\"331\\\" srcset=\\\"https:\/\/u1f987.com\/wp-content\/uploads\/Soobshhenie-na-forume-300x121.jpg 300w, https:\/\/u1f987.com\/wp-content\/uploads\/Soobshhenie-na-forume-768x310.jpg 768w, https:\/\/u1f987.com\/wp-content\/uploads\/Soobshhenie-na-forume.jpg 1024w\\\" sizes=\\\"auto, (max-width: 820px) 100vw, 820px\\\" \/><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Belarusian law enforcement identified the hacker with the assistance of cyber police from the United Kingdom and Romania.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">A criminal case has been opened against the suspect for distributing malicious software.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">As GandCrab emerged in 2018, experts say hackers accepted DASH due to the cryptocurrency&#8217;s high degree of anonymity.<\/span><\/p>\n<p>\\n<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\\\"https:\/\/t.me\/forklogfeed\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog Feed<\/a> \u2014 all the news, <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gomel resident is suspected of involvement with a hacker group that distributed the GandCrab ransomware and demanded a ransom in the cryptocurrency DASH, according to the Belarusian Ministry of Internal Affairs&#8217; website.<\/p>\n","protected":false},"author":1,"featured_media":26665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[239,1154],"class_list":["post-26664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-belarus","tag-crimes"],"aioseo_notices":[],"amp_enabled":true,"views":"11","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=26664"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26664\/revisions"}],"predecessor-version":[{"id":26666,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26664\/revisions\/26666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/26665"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=26664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=26664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=26664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}