FBI adds to its Cyber Most Wanted List
In the fight against malware and suspicious binary, the Federal Bureau of Investigation has added a new set of hackers to its Cyber Most Wanted list.
The list is essentially a digitally-focused wanted list for cyber criminals. However, instead of committing murder, robbery, or other similar criminal offenses, these criminals have masterminded or participated in domestic and international hacking and fraud activities, according to Tripwire. Their malicious activities have threatened the endpoint security of several thousand users, and their malware has resulted in massive data leakage and millions of dollars in monetary losses.
By releasing the names, pictures and other information related to known hackers, the FBI hopes these individuals can be traced and authorities can be notified as to their whereabouts.
"The FBI will not stand by and watch our cyber adversaries attack our networks," Richard McFeely, executive assistant director of the Criminal, Cyber, Response and Services Branch, said. "Because cyber crime knows no boundaries, cyber criminals think that they can hide overseas. But we are using our international partnerships and the publicity generated by our Cyber's Most Wanted to ferret them out."
The most recent additions to the most wanted list include Farhan Arshad, Noor Aziz Uddin, Carlos Perez-Melara, Andrey Nabilevich Taame and Alexsey Belan. These individuals have been responsible for offenses including unauthorized access to a protected computer, intercepting private communications, computer infections that redirect Internet traffic, wire fraud and unauthorized data leakage. For these reasons, law enforcement officials consider the hackers dangerous and seek to detain them. The FBI stated that they are also offering rewards for helping locate and arrest these individuals ranging from $50,000 to $100,000.
To protect systems against cybercriminals of this kind, organizations should employ endpoint protection from Ziften. These security solutions provide safety measures against cybercriminals and can help detect the malware and suspicious binary these criminals are known for. Additionally, when these malicious programs are detected and removed, data leakage is prevented.