CRIME: The dangerous Russian hacker who lives like a Tsar and who has put Spain in his crosshairs
Espionage: This is the elite command of Russian hackers who are accused of trying to steal the Coronavirus vaccine
There are times when it is difficult to
distinguish organized crime from the actions of intelligence services
.
The line is fuzzy and its methods are common.
This is one of these cases.
It is the story of a conspiracy that straddles the sphere of international espionage and illicit profit motives.
Its protagonists are
two Russian citizens
: a mysterious man who flies from Moscow to the United States under a declared identity (about which there is no trace before these events) and a compatriot who emigrated to America to make his fortune as a Tesla employee.
Tesla's stock market value
has soared 500% so far this year
.
The company is going through the sweetest moment in its history: it has recently become the largest manufacturer in the world by market capitalization.
A success that has not gone unnoticed by the world of crime, which has set its sights on Elon Musk's successful company looking to make its own August.
The objective?
Apparently, take control of the computer networks of the automobile company (accounting, customers, R&D, etc.) with the aim of hijacking them and then demanding a ransom.
However, the Russian criminal group's plan was truncated when the Tesla employee, who had been offered a million dollars, decided to report to the FBI.
The case, which has followed the channels of an incident of a criminal nature, is full of unknowns, doubts and chiaroscuro.
Despite having received the treatment of a common crime, the agent in charge of the investigation
(assigned to contain intelligence tasks in North American territory
) includes in his report that the alleged offender uses methods and techniques typical of a field agent during the operation of intelligence.
In his report, the federal agent makes several notes in this regard.
In addition, it
deliberately omits sensitive information
, about other large companies that allegedly would have been victims of the Russian organization before Tesla.
According to the FBI report, it is
an operation planned from Russia that was intended to be carried out on North American territory
.
The first contact relevant to the case between the Tesla employee (about whom not much information about his identity is provided and who has the
status
of
"confidential source"
) and the member of the Russian organization (identified as Kryuchkov in the
affidavit
of the FBI) was made through WhatsApp.
However,
both were old acquaintances since 2016
and had resumed communication through a third person (unidentified) at the end of July this year.
Two old acquaintances
When the protagonists returned to contact by WhatsApp, Kryuchkov told the Tesla employee his intention to visit him during a trip to the United States that he had planned.
Days later, Kryuchkov flew from Moscow to New York and
entered the country legally on a tourist visa
.
In addition, he took advantage of his stop in the Big Apple to
get several "clean" phone cards
and paid for in cash.
Afterward, Kryuchkov flew from New York to San Francisco.
From there, he traveled in a rented car to Nevada, where his compatriot who worked at Tesla resided.
The first meeting between the two took place on August 1.
During the next three days,
Kricuhkov stayed at the employee's home up to 5 times
.
During this time, both (in the company of several acquaintances of the worker) took the opportunity to make excursions to nearby natural places.
It was precisely in these escapades that Kryuchkov began to have
suspicious behavior,
as revealed in the FBI document.
"During the excursions,
Kryuchkov expressly showed his desire not to appear in any photos,
arguing that he did not need them to remember the beauty of the place. However, at the insistence of the rest of his fellow travelers, he ended up posing for a group picture. In addition He also did not use his mobile phone during this time, "the report states.
According to the agent in charge of the case, assigned to counterintelligence tasks and with 15 years of experience in the force, "individuals involved in criminal activities often
make an effort not to leave evidence about their locations
, avoid surveillance systems and do not take Photos".
During the trip, the assistants noticed that Kryuchkov insisted on paying all the expenses related to the escape.
This young 27-year-old Russian justified his expense by claiming that he
had won good money gambling at the casino
.
"I know, thanks to my training and experience, that people involved in intelligence operations and criminal activities often
spend money extravagantly in
front of people who try to recruit or incorporate into their criminal activities," says the federal agent.
At the end of this trip, Kryuchkov told the Tesla employee that he would like to
"talk business"
the next day.
"Special projects"
In this new face-to-face encounter they drank and
got drunk in a restaurant
.
When they were both drunk enough, Kryuchkov piled up the cell phones, pushed them away, and jumped into the pool to try and
recruit his compatriot
.
Kryuchkov told him that he worked for a "group" that paid employees of large companies large sums of money.
In return, they had to
introduce malicious programs
into their employer's computer systems.
The young Russian boasted that
"the group" had carried out these "special projects" successfully
on various occasions against other relevant companies.
However, the names of the companies have been hidden from the FBI report submitted to the judge.
Kryuchkov also explained that the
modus operandi
of these "special projects" consisted of carrying out
two simultaneous actions
.
One of them was carried out remotely over the internet in the form of a denial of services attack against a company.
An attack that the "group" knew had no real chance of success but was
intended
to
serve as a distraction
.
Meanwhile, the actual attack took place from inside the company premises with a recruited employee who was in charge of infecting
the company's networks
with a malicious program,
stored on a USB stick
.
The aim of the action was that the professionals in charge of computer security
were focused on repelling the external attack
while the internal attack was completed successfully.
Once the ruse was successfully executed, it was only necessary for "the group" to contact the company to
ask
for
money for a ransom
.
Something that they had already achieved with success in previous operations, as Kryuchkov himself confessed to his compatriot on different occasions, even mentioning names of large companies affected by this technique.
However,
the names of these companies were omitted from the report that the FBI sent to the judge
.
For the operation against Tesla, the job of the Tesla employee would be to carry out the attack from within and his task was very simple:
insert a USB
with a virus into a computer connected to the company's network.
In exchange,
they offered him half a million dollars
.
From buddy to informant
Days later, on August 7, Kryuchkov and his compatriot who works for the electric car company met again.
This time, the meeting took place inside a car.
However, they were not alone.
The FBI was watching them
.
Sometime between August 3-7,
the Tesla worker betrayed his compatriot
and contacted his company's security department.
He alerted them to his plans and they, in turn,
alerted the FBI.
The worker had gone from being a possible accomplice to becoming an informant.
During the meeting in the car,
Kryuchkov tried to offer "guarantees" to his compatriot
, who pretended to continue cooperating with the gang.
They even haggled over the reward, which amounted to $ 1 million.
Kryuchkov also offered the informant the possibility of
planting false evidence
so that the traces of the crime would lead to a person of his choice.
"El Pachá" and "Kitten"
Over the next several weeks,
both individuals continued to negotiate under the watchful eye of the FBI
.
During this time they agreed that the worker would receive advance payment as a token of good faith.
To do this, they collaborated and planned a way to open a safe and "clean" wallet so that the advance was paid in Bitcoin.
However, the FBI had already managed to tap into the virtual wallet as another way to collect information about the case.
During their frequent encounters, the informant
spoke with other members of the gang
(always hands-free through the mobiles that Kriuchov had).
The FBI document acknowledges that the Tesla employee spoke with a guy who used the alias "
Pasha,
" which the feds refer to with that nickname in official documents.
Pasha was the person responsible for approving the payments that the worker would receive for his collaboration with "the group."
Although it is not mentioned in the FBI report, "Pasha" is the Latin transcription of a Russian word of Turkish origin, which was used to designate a high leader of the Ottoman Empire, usually in the military sphere, so it is very likely this man was responsible for the group.
The Spanish translation of "Pasha" is Pachá
.
Another member of the band is only identified as "
Kisa
".
A Russian diminutive whose translation is "
kitten
".
Kisa's task would be to "notify" (by means of a smiley face emoticon via WhatsApp) the Tesla employee of the starting signal for the operation.
Once the smiley face has been received, the worker should
start up a "secure telephone"
provided by the Kryuchkov.
The phone had secure messaging applications installed.
Also, Kriuchkov indicated to the Tesla worker that he
should have said phone turned off
(to make it difficult to trace) until further notice.
However, such instructions were never received as the FBI arrested Kryuchkov before the "group's" "special project" was launched.
He has been charged with a crime of conspiracy to commit computer fraud and is pending trial.
His cronies follow freedom and
his real identity remains a mystery
.
According to the criteria of The Trust Project
Know more
WhatsApp
U.S
Russia
Elon musk
Bitcoin
CrimeThe dangerous Russian hacker who lives like a Tsar and who has put Spain in his crosshairs
Donald Trump's WeChat veto could end up hurting Apple
InternationalA porn video interrupts the appearance before the judge of the minor accused of hacking large Twitter accounts
See links of interest
Last News
TV programming
English translator
Work calendar
Daily horoscope
Santander League Standings
League schedule
Movies TV
Topics
Live, the fifth stage of the Tour de France