Category | Details |
---|---|
Threat Actors | Russian money laundering networks, Trickbot/Conti/Ryuk ransomware groups, Russian oligarchs, state-linked entities, drug cartels, Kinahan crime syndicate. |
Campaign Overview | Operation Destabilise uncovered a billion-dollar money laundering network linking Russian elites, cybercriminals, drug traffickers, and espionage operations. |
Target Regions (Or Victims) | U.K., Europe, Middle East, Russia, South America, with specific operations in England, Scotland, Wales, and Channel Islands. |
Methodology | Cash-to-cryptocurrency exchanges, traditional money laundering via high-cash turnover businesses, shell companies, property purchases, and global financial systems. |
Product Targeted | Cryptocurrency (e.g., USD Tether), traditional financial assets like shares and bonds, and cash. |
Malware Reference | Linked to ransomware groups Trickbot/Conti/Ryuk. |
Tools Used | Garantex cryptocurrency exchange, shell companies, and TGR Group services for liquidity and logistics. |
Vulnerabilities Exploited | Exploitation of global financial systems and cryptocurrency exchanges to bypass legal barriers and sanctions. |
TTPs | Money laundering via street-level cash, use of couriers, cryptocurrency exchanges, shell companies, and integration of various criminal networks for logistics and funding. |
Attribution | Russian-linked networks, including Smart and TGR Group, led by Ekatarina Zhdanova and George Rossi. |
Recommendations | Strengthen anti-money laundering controls, monitor cryptocurrency transactions, enforce sanctions rigorously, and disrupt logistics networks. |
Source | The Record |
Read full article: https://therecord.media/russian-money-laundering-networks-trafficking-cybercrime-kremlin
Disclaimer: The above summary has been generated by an AI language model
Leave a Reply