🎣 American traitor selling secrets

May 02 2024

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that’s always on the right side of cyber history… Cyberstory? πŸ€”πŸ™ƒπŸ˜‚

Β Today’s hottest cybersecurity news stories:

  • πŸ—½ American traitor who trying selling secrets to Russia gets 22 years πŸ“…

  • πŸ‘¨β€πŸ’» Russian darknet black market suspected in Bitcoin forensic analysis πŸ•΅οΈ

  • πŸ‘¨πŸ»β€πŸ« Let us give you the A to Z on ZLoader and the Zeus Banking Trojan 🐎

NSA what?! πŸ’€

🚨 Former NSA Employee Sentenced to 22 Years for Espionage Attempt πŸ•΅οΈβ€β™‚οΈπŸ”’

In a landmark case highlighting the grave consequences of betraying national trust, a former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in federal prison for his attempt to transfer classified documents to Russia. πŸ‡ΊπŸ‡ΈπŸ”’

FBI Director's Stark Warning βš οΈπŸ”

"This sentence should serve as a stark warning to all those entrusted with protecting national defence information that there are consequences to betraying that trust," emphasised FBI Director Christopher Wray, underscoring the gravity of the offence and its implications for national security. πŸš¨πŸ”’

Details of the Espionage Attempt πŸ•΅οΈβ€β™‚οΈπŸ’»

Jareh Sebastian Dalke, 32, of Colorado Springs, held a brief position as an Information Systems Security Designer at the NSA between June 6 to July 1, 2022, during which he gained access to sensitive classified information. Despite his short tenure, Dalke attempted to transfer top-secret National Defense Information (NDI) documents to what he believed was a Russian agent, unaware that it was an FBI undercover operative. πŸ•΅οΈβ€β™‚οΈπŸ’Ό

The Sting Operation πŸŽ£πŸ’»

In a meticulously planned operation, Dalke made contact with the undercover FBI agent, sharing snippets of classified documents to demonstrate his willingness to cooperate. Subsequently, he attempted to exchange the documents for financial gain, demanding $85,000 for the complete set of files. However, his covert activities were swiftly intercepted, and he was apprehended on September 28, 2022, after transferring the documents at Union Station in downtown Denver. πŸ•΅οΈβ€β™‚οΈπŸ’»

Guilty Plea and Sentencing βš–οΈπŸ”’

Dalke pleaded guilty to the charges in October 2023, acknowledging his willful transmission of classified files with the intent to harm the United States and benefit Russia. As part of his plea agreement, he has been sentenced to nearly 22 years in federal prison, marking a significant victory in safeguarding national security interests. βš–οΈπŸ”’

A Critical Reminder of National Trust πŸ”’

The sentencing of Dalke serves as a critical reminder of the unwavering commitment to safeguarding national interests and the severe consequences that await those who betray the trust placed in them. The case underscores the relentless efforts of law enforcement agencies to thwart espionage attempts and protect the integrity of classified information. πŸ•΅οΈβ€β™‚οΈπŸ”’

As the nation remains vigilant against evolving threats, the conviction of individuals engaged in espionage activities reaffirms the resilience of the United States in defending its sovereignty and upholding the principles of national security. πŸ”’

Researchers: The transactions just looked a Bit off 😏

🚨 New Study Reveals Clusters of Illicit Activity on Bitcoin Blockchain πŸ”πŸ’°

A groundbreaking forensic analysis of transactions on the Bitcoin blockchain has uncovered clusters associated with illicit activity and money laundering, shedding light on previously unknown criminal networks and dark web marketplaces. The findings, presented by Elliptic in collaboration with researchers from the MIT-IBM Watson AI Lab, provide valuable insights into combating financial crime in the digital realm. πŸ’ΌπŸ’°

Elliptic2 Dataset: Unveiling Hidden Patterns πŸ“ŠπŸ•΅οΈβ€β™‚οΈ

The study introduces the Elliptic2 dataset, a massive 26 GB graph dataset containing 122K labelled subgraphs of Bitcoin clusters within a vast background graph. Building upon the Elliptic Data Set (Elliptic1), Elliptic2 aims to leverage graph convolutional neural networks (GCNs) to detect and analyse illicit activities on the blockchain. πŸ’»πŸ”

Combating Financial Crime with Machine Learning πŸ€–πŸ•΅οΈβ€β™‚οΈ

By harnessing the power of machine learning at the subgraph level, the study identifies intricate patterns of money laundering and illicit transactions. Unlike conventional anti-money laundering (AML) solutions, which focus on tracing funds from known illicit sources, Elliptic2 employs advanced techniques to analyse the structural characteristics of illicit subgraphs. πŸ’°πŸ”

Detection of Illicit Activity πŸš¨πŸ”

The study experimented with three subgraph classification methods and successfully identified crypto exchange accounts engaged in illicit activities. It traced the source of funds associated with suspicious subgraphs to entities involved in cryptocurrency mixing, Ponzi schemes, and clandestine dark web forums. πŸ”πŸ’Ό

Unveiling Cryptocurrency Laundering Patterns πŸ’ΌπŸ”„

Further analysis using the GLASS model uncovered known cryptocurrency laundering patterns, such as peeling chains and nested services. Peeling chains involve the repeated splitting of cryptocurrency funds to obscure their originβ€”a technique commonly associated with money laundering activities. The study's independent identification of these patterns demonstrates the efficacy of machine learning in detecting financial crime. πŸ’ΌπŸ’°

Future Directions πŸš€πŸ”

Moving forward, the research aims to enhance the accuracy and precision of detection techniques while extending the analysis to other blockchain networks. By staying ahead of evolving threats, the study underscores the importance of leveraging cutting-edge technologies to safeguard the integrity of financial systems in the digital age. πŸ’»πŸ”’

The groundbreaking findings mark a significant milestone in the ongoing fight against financial crime, highlighting the pivotal role of collaboration between academia, industry, and law enforcement in preserving the security and transparency of cryptocurrency ecosystems. πŸ’ΌπŸ•΅οΈβ€β™‚οΈπŸ”

What the Zeus? 🀲🧎β›ͺ

🚨 ZLoader Malware Upgrades: A Sneak Peek Inside the Latest Version! πŸ’€

The infamous ZLoader malware is back with a bang, showcasing its active development with the latest version, 2.4.1.0. πŸš€ Developed from the Zeus banking trojan, ZLoader now boasts an anti-analysis feature akin to its predecessor, making it harder to detect and analyse. πŸ’»

Evolution Unleashed πŸ’

After a nearly two-year hiatus, ZLoader has resurfaced, armed with RSA encryption and updates to its domain generation algorithm. πŸ’‘ But the real game-changer? An anti-analysis feature that restricts execution to the infected machine, thwarting attempts at analysis on different systems. πŸ”’

Under the Hood πŸ‘¨β€πŸ”§

Implemented via Windows Registry checks, ZLoader terminates abruptly if executed on non-infected machines. 😨 Each sample generates a unique seed, making replication a daunting task. 🌱

The Cat-and-Mouse Game 😺🐁

As ZLoader evolves stealthily, threat actors employ fraudulent websites to spread malware. πŸ•΅οΈβ€β™‚οΈ Infections escalate via top search engine results, increasing the risk of unwittingly downloading malicious software. 🌐

Email Phishing and Beyond πŸ“§

Phishing campaigns targeting various sectors have surged, with Taskun malware facilitating Agent Tesla infections. πŸ“§ Stay vigilant as cyber threats continue to evolve! πŸ›‘οΈ

πŸ—žοΈ Extra, Extra! Read all about it! πŸ—žοΈ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • πŸ›‘οΈ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday πŸ“…

  • πŸ’΅Β Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for πŸ†“

  • πŸ“ˆΒ Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future πŸ‘Ύ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles