/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Jamie MacColl

@jamiemaccoll
10 posts
2024-12-04
The UK National Crime Agency has just disclosed a major operation that disrupted Russian speaking illicit finance network that laundered money for drug gangs, ransomware operators and Russian elites: https://www.nationalcrimeagency.gov.uk/ ...
2024-12-04 View on X
Financial Times

The UK NCA uncovers a Russian multibillion-dollar money laundering scheme that let Russian spies, European drug traffickers, and more evade sanctions via crypto

Multibillion-dollar ring across London, Moscow and Dubai connected cash-rich criminals with sanctions evaders

2024-03-26
Are sanctions a reasonable response to (unsuccessfully) targeting MPs for intelligence collection? Given we mostly employ public attribution and sanctions for responding to cyber ops, how do we signal that a more disruptive attack or meaningful theft matters more to us than this?
2024-03-26 View on X
BleepingComputer

The US and the UK sanction a Wuhan-based company linked to the Chinese state-backed hacking group APT31 for targeting critical infrastructure organizations

APT31 has a focus on political targets, but also high tech and intellectual property — The benign emails with tracking links followed by remote exploitation of routers is a usually...

If the sanctions are in response to the broad array of activities APT31 has conducted against the US, UK and others then say so... the justification in UK statements has been much narrower.
2024-03-26 View on X
BleepingComputer

The US and the UK sanction a Wuhan-based company linked to the Chinese state-backed hacking group APT31 for targeting critical infrastructure organizations

APT31 has a focus on political targets, but also high tech and intellectual property — The benign emails with tracking links followed by remote exploitation of routers is a usually...

2023-02-10
US and UK have jointly sanctioned seven Russians linked to the Trickbot/Conti/Ryuk operations. https://home.treasury.gov/... First UK ransomware sanctions.
2023-02-10 View on X
The Record

The US and the UK sanction seven people based in Russia, with likely FSB ties, connected to the Conti and Ryuk ransomware gangs and the Trickbot banking trojan

on par with terrorism and military crisis between states. Cheyenne Ligon / CoinDesk : Russian Cybercrime Gang Trickbot Sanctioned by US, UK Maggie Miller / Politico : U.S., U.K. sa...

UK announcement here: https://www.gov.uk/... New OFSI guidance here: https://assets.publishing.service.gov.u k/ ...
2023-02-10 View on X
The Record

The US and the UK sanction seven people based in Russia, with likely FSB ties, connected to the Conti and Ryuk ransomware gangs and the Trickbot banking trojan

on par with terrorism and military crisis between states. Cheyenne Ligon / CoinDesk : Russian Cybercrime Gang Trickbot Sanctioned by US, UK Maggie Miller / Politico : U.S., U.K. sa...

2023-02-05
This is really great reporting. It also reinforces some of the implications of the Hive take down for law enforcement and cyber operations — focus on creating distrust within the groups. https://twitter.com/...
2023-02-05 View on X
Bloomberg

Interviews detail the Conti ransomware group's 2021 attack on Ireland's public health system; Conti seemingly called off the hack without getting a ransom

focus on creating distrust within the groups. https://twitter.com/... Ryan Gallagher / @rj_gallagher : I went to Ireland to hear about a horrific cyberattack on the country's hospi...

2022-01-15
The FSB has arrested 14 members of the REvil ransomware group. This is going to test a lot of assumptions about how the Russian state deals with cybercriminals within its borders. https://therecord.media/...
2022-01-15 View on X
Reuters

Russia's FSB says it detained and charged REvil ransomware gang members at the request of the US; source: Russian citizens won't be handed over to the US

Russia's FSB security service conducted a special operation against ransomware crime group REvil at the request of the United States …

2021-11-04
I've seen a lot of people interpret ‘local authorities’ as Russian law enforcement/intelligence but could it not also refer to recent operations in Ukraine? https://twitter.com/...
2021-11-04 View on X
The Record

The criminal group behind BlackMatter ransomware announces plans to shut down the operation, citing “pressure from the authorities”

Catalin Cimpanu / The Record :

2020-11-15
Microsoft framing what appears to be espionage/intelligence collection as ‘cyberattacks’ on vaccine researchers is unhelpful. Conflating espionage with sabotage is just going to serve to make people more frightened than is necessary: https://blogs.microsoft.com/ ...
2020-11-15 View on X
ZDNet

Microsoft says it detected three APTs, from N. Korea and Russia, that launched attacks on at least seven companies developing a COVID-19 vaccine or treatments

The three state-sponsored hacker groups (APTs) are Russia's Strontium (Fancy Bear) and North Korea's Zinc (Lazarus Group) and Cerium.

2020-11-14
Microsoft framing what appears to be espionage/intelligence collection as ‘cyberattacks’ on vaccine researchers is unhelpful. Conflating espionage with sabotage is just going to serve to make people more frightened than is necessary: https://blogs.microsoft.com/ ...
2020-11-14 View on X
ZDNet

Microsoft says it detected three APTs, from N. Korea and Russia, that launched attacks on at least seven companies developing a COVID-19 vaccine or treatments

The three state-sponsored hacker groups (APTs) are Russia's Strontium (Fancy Bear) and North Korea's Zinc (Lazarus Group) and Cerium.