• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware

You are here: Home / Cyber Security News / U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware

The U.S. Justice Office on Monday accused a 55-year-outdated cardiologist from Venezuela of currently being the mastermind behind Thanos ransomware, charging him with the use and sale of the destructive resource and getting into into financial gain sharing arrangements.

Moises Luis Zagala Gonzalez, also acknowledged by the monikers Nosophoros, Aesculapius, and Nebuchadnezzar, is alleged to have each created and promoted the ransomware to other cybercriminals to facilitate the intrusions and get a share of the bitcoin payment.

If convicted, Zagala faces up to five years’ imprisonment for attempted laptop intrusion, and 5 years’ imprisonment for conspiracy to commit computer intrusions.

“The multi-tasking health practitioner addressed sufferers, developed and named his cyber tool following demise, profited from a world ransomware ecosystem in which he bought the applications for conducting ransomware assaults, trained the attackers about how to extort victims, and then boasted about successful assaults, like by malicious actors associated with the federal government of Iran,” U.S. attorney Breon Peace explained.

The ransomware-as-a-company (RaaS) plan involved encrypting data files belonging to providers, non-profit entities, and other institutions, and then demanding a ransom in exchange for the decryption critical.

At its core, Thanos is a personal ransomware builder that lets its purchasers (aka affiliate marketers) to generate their have personalized ransomware software program, which they could then use or lease it to other actors, efficiently widening the scope of the attacks.

An assessment by Recorded Long run in June 2020 disclosed that the builder will come with 43 various configuration options, contacting it the first ransomware family to leverage the RIPlace strategy to bypass ransomware defense capabilities crafted into Windows 10.

Alternatives available consist of the ability to modify the ransom notes, specify the listing of file sorts to be exfiltrated prior to encryption, and options to evade detection and self-delete the ransomware just after execution.

Zagala is believed to have advertised the software on darknet cybercrime forums for $500 a thirty day period with “standard alternatives” or $800 with “comprehensive selections,” though also recruiting affiliates for the RaaS method.

“On or about May perhaps 1, 2020, a confidential human resource of the FBI (CHS-1) reviewed signing up for Zagala’s ‘affiliate method,'” the DoJ stated. “Zagala responded: ‘Not for now. Don’t have places,” prior to continuing to license the computer software to CHS-1 and supporting the informant with tutorials on how to use the application and established up an affiliate crew.

Zagala, who obtained favorable testimonials for his ransomware resources, was ultimately traced on May well 3, 2022, immediately after pinpointing a PayPal account belonging to his relative who resides in the U.S. state of Florida and which utilised to get the illicit proceeds.

“The individual verified that Zagala resides in Venezuela and had taught himself laptop programming,” the DoJ stated.

Uncovered this write-up intriguing? Stick to THN on Facebook, Twitter  and LinkedIn to read much more exceptional material we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners
Next Post: Conti ransomware group threatens to oust Costa Rica's government as crisis deepens »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.