U.S. authorities arrest suspects linked to ‘Warzone RAT’ cybercrime network
In a significant breakthrough in the fight against cybercrime, the United States law enforcement agencies have announced the arrest of multiple individuals suspected of involvement in the notorious ‘Warzone RAT’ cybercriminal network.
The arrests were made following extensive investigations into the activities of the cybercrime group, which is believed to have orchestrated a wide range of malicious activities, including data breaches, identity theft, and financial fraud, using the Warzone Remote Access Trojan (RAT).
According to federal prosecutors in Boston, two individuals in Malta and Nigeria have been apprehended on charges related to their involvement in the illicit distribution of the Warzone RAT.
An indictment filed in federal court in Atlanta has charged Daniel Meli, a 27-year-old resident of Zabbar, Malta, with multiple cyber-related offences, including causing unauthorized damage to protected computers.
Since 2012, prosecutors allege that he has been distributing malware products such as the Warzone RAT through online computer-hacking forums. Additionally, he purportedly offered instructional materials, including an eBook, for sale. The U.S. government is currently seeking his extradition to face charges related to these activities.
According to prosecutors, Prince Onyeoziri Odinakachi, aged 31 and hailing from Nigeria, has been charged in an indictment filed in Boston with conspiracy to commit multiple computer intrusion offences.
The indictment alleges that between June 2019 and March 2023, Odinakachi provided online customer support services to users of the Warzone RAT malware.
Defence lawyers for Meli and Odinakachi could not be immediately identified.
Also Read: AI, cyber inequity portend risks for cybersecurity sector – Report
As part of the operation, four websites facilitating the sale of the malicious “Warzone RAT” malware which allowed cybercriminals to secretly connect to people’s computers for malicious purposes, had been taken down.
Prosecutors revealed that the malware enabled hackers to conduct a range of invasive actions, including browsing file systems, capturing screenshots, obtaining user names and passwords, recording keystrokes, and even monitoring computer users via their web cameras.
Jodi Cohen, head of the Federal Bureau of Investigation’s Boston office, called it sophisticated malware that was used to infect computers globally.
The Warzone RAT, known for its ability to remotely infiltrate and control computer systems, has been a growing concern for cybersecurity experts worldwide. It is often deployed by cybercriminals to gain unauthorized access to sensitive information, compromise networks and carry out malicious attacks with devastating consequences.
The crackdown on the Warzone RAT cybercriminal network comes amid growing concerns over the proliferation of cyber threats and the need for enhanced cybersecurity measures to safeguard against increasingly sophisticated attacks targeting individuals and organizations worldwide.
Comments are closed.