Who wouldn’t crave a fortune of US$2.5 million?
The United States Division, State, and Secret Service are offering a reward for information leading to the arrest and/or conviction of a Belarusian individual believed to be a key figure behind the development and dissemination of the notorious Angler Exploit Kit.
A 38-year-old man, Vladimir Kadariya, has been accused of committing a range of cybercrimes that allegedly swindled tens of millions of internet users out of their money through malicious advertising and other means over at least a five-year period from October 2013 onwards.
Malicious advertisements have been crafted to appear trustworthy, but unsuspecting internet users who engage with these commercials are often redirected to fraudulent websites or servers that aim to deceive them or install malware on their devices. The Angler exploit kit was a notorious tool that enabled attackers to deliver malware onto vulnerable devices, quickly rising to become the most popular and feared cyber threat in its time.
Kadariya, accused online alias names “Stalin,” “Eseb,” and “baxus,” faced charges in June 2023, but the indictment remained sealed until this month when he was identified as a co-conspirator of alleged ransomware kingpin Maksim Silnikau (also known as ).
For nearly a decade, the Angler Exploit Kit has been responsible for compromising tens of millions of laptop users by spreading malware through compromised online advertisements on a wide range of websites – from celebrity gossip sites to news articles, including a sarcastic piece that unwittingly hosted malicious code.
Kadariya’s involvement in “scareware” attacks may raise suspicions, as victims are duped into thinking their computers are infected with malware or plagued by other problems, prompting hasty action. Unwary individuals may unwittingly fall prey to deceitful schemes, leading them to purchase or download malware that surreptitiously provides cybercriminals with remote access to their computers and potentially compromises sensitive personal data.
Victims of these assaults can be monetized through various means, such as stolen banking information and login credentials being sold to fraudsters on cybercrime forums, or compromised PCs being recruited into botnets that can be further exploited for malicious purposes.
Kadariya’s whereabouts are presently unknown.
Individuals seeking a portion of the $2.5 million reward should utilize information potentially leading to Kadariya’s capture.
Alternatively, individuals outside of the USA are encouraged to reach out to the nearest US embassy or consulate for assistance.