• CRIME: The dangerous Russian hacker who lives like a Tsar and who has put Spain in his crosshairs

  • Espionage: This is the elite command of Russian hackers who are accused of trying to steal the Coronavirus vaccine

There are times when it is difficult to

distinguish organized crime from the actions of intelligence services

.

The line is fuzzy and its methods are common.

This is one of these cases.

It is the story of a conspiracy that straddles the sphere of international espionage and illicit profit motives.

Its protagonists are

two Russian citizens

: a mysterious man who flies from Moscow to the United States under a declared identity (about which there is no trace before these events) and a compatriot who emigrated to America to make his fortune as a Tesla employee.

Tesla's stock market value

has soared 500% so far this year

.

The company is going through the sweetest moment in its history: it has recently become the largest manufacturer in the world by market capitalization.

A success that has not gone unnoticed by the world of crime, which has set its sights on Elon Musk's successful company looking to make its own August.

The objective?

Apparently, take control of the computer networks of the automobile company (accounting, customers, R&D, etc.) with the aim of hijacking them and then demanding a ransom.

However, the Russian criminal group's plan was truncated when the Tesla employee, who had been offered a million dollars, decided to report to the FBI.

The case, which has followed the channels of an incident of a criminal nature, is full of unknowns, doubts and chiaroscuro.

Despite having received the treatment of a common crime, the agent in charge of the investigation

(assigned to contain intelligence tasks in North American territory

) includes in his report that the alleged offender uses methods and techniques typical of a field agent during the operation of intelligence.

In his report, the federal agent makes several notes in this regard.

In addition, it

deliberately omits sensitive information

, about other large companies that allegedly would have been victims of the Russian organization before Tesla.

According to the FBI report, it is

an operation planned from Russia that was intended to be carried out on North American territory

.

The first contact relevant to the case between the Tesla employee (about whom not much information about his identity is provided and who has the

status

of

"confidential source"

) and the member of the Russian organization (identified as Kryuchkov in the

affidavit

of the FBI) ​​was made through WhatsApp.

However,

both were old acquaintances since 2016

and had resumed communication through a third person (unidentified) at the end of July this year.

Two old acquaintances

When the protagonists returned to contact by WhatsApp, Kryuchkov told the Tesla employee his intention to visit him during a trip to the United States that he had planned.

Days later, Kryuchkov flew from Moscow to New York and

entered the country legally on a tourist visa

.

In addition, he took advantage of his stop in the Big Apple to

get several "clean" phone cards

and paid for in cash.

Afterward, Kryuchkov flew from New York to San Francisco.

From there, he traveled in a rented car to Nevada, where his compatriot who worked at Tesla resided.

The first meeting between the two took place on August 1.

During the next three days,

Kricuhkov stayed at the employee's home up to 5 times

.

During this time, both (in the company of several acquaintances of the worker) took the opportunity to make excursions to nearby natural places.

It was precisely in these escapades that Kryuchkov began to have

suspicious behavior,

as revealed in the FBI document.

"During the excursions,

Kryuchkov expressly showed his desire not to appear in any photos,

arguing that he did not need them to remember the beauty of the place. However, at the insistence of the rest of his fellow travelers, he ended up posing for a group picture. In addition He also did not use his mobile phone during this time, "the report states.

According to the agent in charge of the case, assigned to counterintelligence tasks and with 15 years of experience in the force, "individuals involved in criminal activities often

make an effort not to leave evidence about their locations

, avoid surveillance systems and do not take Photos".

During the trip, the assistants noticed that Kryuchkov insisted on paying all the expenses related to the escape.

This young 27-year-old Russian justified his expense by claiming that he

had won good money gambling at the casino

.

"I know, thanks to my training and experience, that people involved in intelligence operations and criminal activities often

spend money extravagantly in

front of people who try to recruit or incorporate into their criminal activities," says the federal agent.

At the end of this trip, Kryuchkov told the Tesla employee that he would like to

"talk business"

the next day.

"Special projects"

In this new face-to-face encounter they drank and

got drunk in a restaurant

.

When they were both drunk enough, Kryuchkov piled up the cell phones, pushed them away, and jumped into the pool to try and

recruit his compatriot

.

Kryuchkov told him that he worked for a "group" that paid employees of large companies large sums of money.

In return, they had to

introduce malicious programs

into their employer's computer systems.

The young Russian boasted that

"the group" had carried out these "special projects" successfully

on various occasions against other relevant companies.

However, the names of the companies have been hidden from the FBI report submitted to the judge.

Kryuchkov also explained that the

modus operandi

of these "special projects" consisted of carrying out

two simultaneous actions

.

One of them was carried out remotely over the internet in the form of a denial of services attack against a company.

An attack that the "group" knew had no real chance of success but was

intended

to

serve as a distraction

.

Meanwhile, the actual attack took place from inside the company premises with a recruited employee who was in charge of infecting

the company's networks

with a malicious program,

stored on a USB stick

.

The aim of the action was that the professionals in charge of computer security

were focused on repelling the external attack

while the internal attack was completed successfully.

Once the ruse was successfully executed, it was only necessary for "the group" to contact the company to

ask

for

money for a ransom

.

Something that they had already achieved with success in previous operations, as Kryuchkov himself confessed to his compatriot on different occasions, even mentioning names of large companies affected by this technique.

However,

the names of these companies were omitted from the report that the FBI sent to the judge

.

For the operation against Tesla, the job of the Tesla employee would be to carry out the attack from within and his task was very simple:

insert a USB

with a virus into a computer connected to the company's network.

In exchange,

they offered him half a million dollars

.

From buddy to informant

Days later, on August 7, Kryuchkov and his compatriot who works for the electric car company met again.

This time, the meeting took place inside a car.

However, they were not alone.

The FBI was watching them

.

Sometime between August 3-7,

the Tesla worker betrayed his compatriot

and contacted his company's security department.

He alerted them to his plans and they, in turn,

alerted the FBI.

The worker had gone from being a possible accomplice to becoming an informant.

During the meeting in the car,

Kryuchkov tried to offer "guarantees" to his compatriot

, who pretended to continue cooperating with the gang.

They even haggled over the reward, which amounted to $ 1 million.

Kryuchkov also offered the informant the possibility of

planting false evidence

so that the traces of the crime would lead to a person of his choice.

"El Pachá" and "Kitten"

Over the next several weeks,

both individuals continued to negotiate under the watchful eye of the FBI

.

During this time they agreed that the worker would receive advance payment as a token of good faith.

To do this, they collaborated and planned a way to open a safe and "clean" wallet so that the advance was paid in Bitcoin.

However, the FBI had already managed to tap into the virtual wallet as another way to collect information about the case.

During their frequent encounters, the informant

spoke with other members of the gang

(always hands-free through the mobiles that Kriuchov had).

The FBI document acknowledges that the Tesla employee spoke with a guy who used the alias "

Pasha,

" which the feds refer to with that nickname in official documents.

Pasha was the person responsible for approving the payments that the worker would receive for his collaboration with "the group."

Although it is not mentioned in the FBI report, "Pasha" is the Latin transcription of a Russian word of Turkish origin, which was used to designate a high leader of the Ottoman Empire, usually in the military sphere, so it is very likely this man was responsible for the group.

The Spanish translation of "Pasha" is Pachá

.

Another member of the band is only identified as "

Kisa

".

A Russian diminutive whose translation is "

kitten

".

Kisa's task would be to "notify" (by means of a smiley face emoticon via WhatsApp) the Tesla employee of the starting signal for the operation.

Once the smiley face has been received, the worker should

start up a "secure telephone"

provided by the Kryuchkov.

The phone had secure messaging applications installed.

Also, Kriuchkov indicated to the Tesla worker that he

should have said phone turned off

(to make it difficult to trace) until further notice.

However, such instructions were never received as the FBI arrested Kryuchkov before the "group's" "special project" was launched.

He has been charged with a crime of conspiracy to commit computer fraud and is pending trial.

His cronies follow freedom and

his real identity remains a mystery

.

According to the criteria of The Trust Project

Know more

  • WhatsApp

  • U.S

  • Russia

  • Elon musk

  • Bitcoin

CrimeThe dangerous Russian hacker who lives like a Tsar and who has put Spain in his crosshairs

Donald Trump's WeChat veto could end up hurting Apple

InternationalA porn video interrupts the appearance before the judge of the minor accused of hacking large Twitter accounts

See links of interest

  • Last News

  • TV programming

  • English translator

  • Work calendar

  • Daily horoscope

  • Santander League Standings

  • League schedule

  • Movies TV

  • Topics

  • Live, the fifth stage of the Tour de France