Press ESC to close

Russian money laundering networks uncovered linking narco traffickers, ransomware gangs and Kremlin spies

Category Details
Threat Actors Russian money laundering networks, Trickbot/Conti/Ryuk ransomware groups, Russian oligarchs, state-linked entities, drug cartels, Kinahan crime syndicate.
Campaign Overview Operation Destabilise uncovered a billion-dollar money laundering network linking Russian elites, cybercriminals, drug traffickers, and espionage operations.
Target Regions (Or Victims) U.K., Europe, Middle East, Russia, South America, with specific operations in England, Scotland, Wales, and Channel Islands.
Methodology Cash-to-cryptocurrency exchanges, traditional money laundering via high-cash turnover businesses, shell companies, property purchases, and global financial systems.
Product Targeted Cryptocurrency (e.g., USD Tether), traditional financial assets like shares and bonds, and cash.
Malware Reference Linked to ransomware groups Trickbot/Conti/Ryuk.
Tools Used Garantex cryptocurrency exchange, shell companies, and TGR Group services for liquidity and logistics.
Vulnerabilities Exploited Exploitation of global financial systems and cryptocurrency exchanges to bypass legal barriers and sanctions.
TTPs Money laundering via street-level cash, use of couriers, cryptocurrency exchanges, shell companies, and integration of various criminal networks for logistics and funding.
Attribution Russian-linked networks, including Smart and TGR Group, led by Ekatarina Zhdanova and George Rossi.
Recommendations Strengthen anti-money laundering controls, monitor cryptocurrency transactions, enforce sanctions rigorously, and disrupt logistics networks.
Source The Record

Read full article: https://therecord.media/russian-money-laundering-networks-trafficking-cybercrime-kremlin

Disclaimer: The above summary has been generated by an AI language model

Source: The Record

Published on: December 4, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *