Category: Department of Justice

  • MIL-OSI Security: California Man Sentenced to Prison for Fraud

    Source: United States Department of Justice (National Center for Disaster Fraud)

    PHOENIX, Ariz. – Ronnie Lamar Strawberry, Jr., 39, of Los Angeles, California was sentenced on May 19, 2025, by Senior United States District Judge G. Murray Snow to 33 months in prison and ordered to pay $528,426 in restitution. Strawberry pleaded guilty to Conspiracy to Commit Wire Fraud. His sister, Raychelle Strawberry, who pleaded guilty to the same charge, was sentenced on the same day to 60 months of probation for her role in the offense. 

    According to the court documents and statements made in court, Ronnie Strawberry conspired with his sister and others to file false and fraudulent unemployment insurance claims under the Pandemic Unemployment Assistance program. Strawberry filed fraudulent claims in both California and Arizona using stolen identities. The scheme was sophisticated and used personal identifiable information — such as name, date of birth, and social security number — from more than 25 individuals to file online unemployment applications in Arizona and California.

    “The defendant exploited a national crisis for personal gain,” said U.S. Attorney Timothy Courchaine. “He stole nearly $500,000 in pandemic relief funds that were meant to support struggling families and small businesses. This office will continue to investigate and prosecute those who stole from state and federal governments during the pandemic and intentionally depleted the public fisc for personal profit.”

    “An important part of the mission of the U.S. Department of Labor, Office of Inspector General is to investigate allegations of fraud involving unemployment insurance (UI) programs. We will continue to work with our law enforcement partners to protect the integrity of the nation’s Unemployment Insurance system,” said Quentin Heiden, Special Agent-in-Charge, Western Region, U.S. Department of Labor, Office of Inspector General.

    U.S. Department of Labor, Office of Inspector General (OIG), Arizona Department of Economic Security (DES) OIG, and Homeland Security, OIG conducted the investigation in this case. Assistant U.S. Attorney, Kevin M. Rapp, District of Arizona handled the prosecution.

    CASE NUMBER:           CR-24-00390- PHX-GMS
    RELEASE NUMBER:    2025-080_Strawberry

    # # #
    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.

    MIL Security OSI

  • MIL-OSI USA: Padilla, Schiff Condemn Trump Administration’s Student Visa Revocations

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)
    WASHINGTON, D.C. — U.S. Senators Alex Padilla, Ranking Member of the Senate Judiciary Immigration Subcommittee, and Adam Schiff (both D-Calif.) blasted the Trump Administration’s recent harmful revocations of international student visas, including on ideological grounds, underscoring the lack of due process regarding these revocations and the chilling effect of these actions in suppressing freedom of thought and expression. In their letter to Secretary of State Marco Rubio and Department of Homeland Security (DHS) Secretary Kristi Noem, the Senators condemn the revocation of hundreds of California student visas and Immigration and Customs Enforcement’s (ICE) termination of several hundred California students’ Student and Exchange Visitor Information System (SEVIS) records.
    The Senators called on the State Department to immediately stop their “Catch and Revoke” AI-powered initiative, an effort to monitor millions of social media accounts of student visa holders and green card holders to gather evidence of alleged terrorist sympathies. The technology is reportedly being used to monitor international students’ speech through SEVIS and other publicly available resources, leading to the revocation of student visas or green cards for students exercising peaceful expression, without due process. This step to surveil international students’ activity is an unprecedented leap toward stifling students’ First Amendment rights and their freedom of speech. The Senators pushed for restoring revoked visas and full transparency.
    While the Department of Justice has reversed the termination of students’ SEVIS records, the student visa revocations under Catch and Revoke remain ongoing and are instilling fear and uncertainty among international students at colleges and universities in California and across the country.
    “These visa revocations and record terminations constitute unprecedented and unconstitutional attacks on freedom of thought and expression that impact international and U.S. citizen students alike at our nation’s colleges and universities,” wrote the Senators. “While we welcome the news that the Administration has taken steps to rectify the SEVIS record terminations, these actions taken all together still call into question our nation’s bedrock commitment to freedom of expression. We urge the State Department and DHS to suspend the ‘Catch and Revoke’ initiative, which continues to cause uncertainty, erode due process, and chill free speech and expression among students.”
    “The actions taken as part of the ‘Catch and Revoke’ initiative suggest a troubling pattern of misusing immigration enforcement to suppress dissent, intimidate politically active students, and chill Constitutionally protected expression,” continued the Senators. “Without transparency or independent oversight, the risk of abuse continues to grow. In fact, USCIS is now openly targeting speech by noncitizens with other immigration statuses, not just students.”
    The Senators detailed a series of other alarming incidents targeting international students, as ICE has detained students on university campuses, at ports of entry, and in their own homes, often without notice or time to contact an attorney. Many of these cruel arrests were based on limited information within these students’ visa applications and violate the right to due process.
    “Reports indicate that ICE has arrested students based on vague or previously disclosed information in their visa applications — such as social media posts, protest participation, or lawful political associations — as justification for their detention,” added the Senators. “If true, these practices represent not just an overreach of immigration authority but a violation of students’ First Amendment rights. These processes do not appear to be conducted with consideration for students’ due process and require immediate remediation.”
    Padilla and Schiff highlighted the immense contributions international students make to colleges and universities in California and nationwide. California’s more than 140,000 international students contribute roughly $6.4 billion to the U.S. economy and support about 55,114 jobs. These students also strengthen and help the United States secure its global leadership in science, technology, and research; protect U.S. national security interests; and promote innovation.
    The Senators emphasized the critical role California’s higher education system plays in powering the U.S. economy and warned that the attacks on the state’s international students jeopardize the country’s economic future.
    “California’s higher education system is the largest in the nation and considered one of the best in the world, driving global economic mobility—and fueling California’s growth into the fourth largest economy in the world,” wrote the Senators. “These institutions serve as beacons of opportunity and economic potential that transform the lives of hundreds of thousands of students in providing a better life for themselves, their families, and future generations. However, this Administration’s attacks on institutions of higher education and international students, who add immense value to our universities, puts our nation’s economic future at risk.”
    Last month, Senators Padilla and Schiff joined 34 Democrats in pressing the Trump Administration to reconsider recent decisions to revoke student visas. In 2021, Padilla led a group of 23 Senators in calling on the State Department to address the backlog of visas for international students. Padilla also chaired a hearing entitled “Strengthening our Workforce and Economy through Higher Education and Immigration” in 2022, highlighting the challenges undocumented students and international students face in seeking higher education and obtaining jobs in the United States.
    Full text of the letter is available here and below:
    Dear Secretary Rubio and Secretary Noem:
    We write to express our increasing concern about actions targeting international students by the State Department and by Immigration and Customs Enforcement (ICE). Starting earlier this year, the State Department began revoking hundreds of student visas including on apparent ideological grounds, revoking roughly a hundred visas in California alone. These revocations have been conducted by the State Department through its AI-enabled “Catch and Revoke” initiative, instructing affected students to leave the country voluntarily or risk facing deportation proceedings. At the same time, ICE began terminating Student and Exchange Visitor Information System (SEVIS) records for thousands of students—leaving them uncertain about their ability to continue their studies. This includes at least two hundred students in California.
    These visa revocations and record terminations constitute unprecedented and unconstitutional attacks on freedom of thought and expression that impact international and U.S. citizen students alike at our nation’s colleges and universities. While we welcome the news that the Administration has taken steps to rectify the SEVIS record terminations, these actions taken all together still call into question our nation’s bedrock commitment to freedom of expression. We urge the State Department and DHS to suspend the “Catch and Revoke” initiative, which continues to cause uncertainty, erode due process, and chill free speech and expression among students.
    Colleges and universities across the U.S. have long benefitted from the enrollment and participation of international students, who contribute immensely to academic, scientific, and cultural life at schools all around the country. This should not be a partisan issue—there are over 1.1 million international students all over the country, across many states, and the District of Columbia. California enrolls more than 140,850 international students who contribute approximately $6.4 billion to our economy, supporting around 55,114 jobs. Nationally, over 1.12 million international students contribute roughly $43.8 billion to the U.S. economy and support over 370,000 jobs. They also strengthen our national security by fostering global partnerships, cross-cultural understanding, and long-term diplomatic ties with future world leaders educated in the U.S. By attracting top talent from around the globe, we bolster our workforce, drive innovation, and better position ourselves to maintain our competitive edge in science, technology, and research.
    In addition to the State Department visa revocations, multiple alarming incidents have surfaced in recent months involving international students detained by immigration enforcement at university campuses, ports of entry, and even in their homes. In a significant departure from normal practice, these students were, in many cases, not provided prior notice and given no time to contact an attorney, leaving many with few options to defend their nonimmigrant status and their ability to continue studying in the United States. Reports indicate that ICE has arrested students based on vague or previously disclosed information in their visa applications—such as social media posts, protest participation, or lawful political associations—as justification for their detention. If true, these practices represent not just an overreach of immigration authority but a violation of students’ First Amendment rights. These processes do not appear to be conducted with consideration for students’ due process and require immediate remediation.
    The actions taken as part of the “Catch and Revoke” initiative suggest a troubling pattern of misusing immigration enforcement to suppress dissent, intimidate politically active students, and chill Constitutionally protected expression. Without transparency or independent oversight, the risk of abuse continues to grow. In fact, USCIS is now openly targeting speech by noncitizens with other immigration statuses, not just students.
    California’s higher education system is the largest in the nation and considered one of the best in the world, driving global economic mobility—and fueling California’s growth into the fourth largest economy in the world. These institutions serve as beacons of opportunity and economic potential that transform the lives of hundreds of thousands of students in providing a better life for themselves, their families, and future generations. However, this Administration’s attacks on institutions of higher education and international students, who add immense value to our universities, puts our nation’s economic future at risk.
    We urge your agencies to take immediate corrective action by suspending the Catch and Revoke initiative, restoring revoked visas, and providing full transparency to ensure that our immigration system is not misused to police speech at our colleges and universities and maintain beneficial international exchange at universities. We look forward to your prompt response.
    Sincerely,

    MIL OSI USA News

  • MIL-OSI USA: Russian GRU Targeting Western Logistics Entities and Technology Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL OSI USA News -

  • MIL-OSI USA: The U.S. Department of Justice’s Civil Rights Division Dismisses Biden-Era Police Investigations and Proposed Police Consent Decrees in Louisville and Minneapolis

    Source: US State of North Dakota

    Today, the Department of Justice’s Civil Rights Division is beginning the process of dismissing lawsuits against the Louisville, Kentucky and Minneapolis, Minnesota police departments.

    These lawsuits, which were filed at the last minute by the Biden administration after President Donald Trump’s reelection, accused Louisville and Minneapolis of widespread patterns of unconstitutional policing practices by wrongly equating statistical disparities with intentional discrimination and heavily relying on flawed methodologies and incomplete data. They also sought to subject the Louisville and Minneapolis police departments to sweeping consent decrees that went far beyond the Biden administration’s accusations of unconstitutional conduct; the decrees would have governed many aspects of those police departments, including their management, supervision, training, performance evaluations, discipline, staffing, recruitment, and hiring.  In short, these sweeping consent decrees would have imposed years of micromanagement of local police departments by federal courts and expensive independent monitors, and potentially hundreds of millions of dollars of compliance costs, without a legally or factually adequate basis for doing so.

    “Overbroad police consent decrees divest local control of policing from communities where it belongs, turning that power over to unelected and unaccountable bureaucrats, often with an anti-police agenda,” added Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division. “Today, we are ending the Biden Civil Rights Division’s failed experiment of handcuffing local leaders and police departments with factually unjustified consent decrees.”

    The Civil Rights Division will be taking all necessary steps to dismiss the Louisville and Minneapolis lawsuits with prejudice, to close the underlying investigations into the Louisville and Minneapolis police departments, and to retract the Biden administration’s findings of constitutional violations.

    The Civil Rights Division will also be closing its investigations into, and retracting the Biden administration’s findings of constitutional violations on the part of, the following additional local police departments:

    • Phoenix, Arizona
    • Trenton, New Jersey
    • Memphis, Tennessee
    • Mount Vernon, New York
    • Oklahoma City, Oklahoma
    • Louisiana State Police

    The Department of Justice will continue to offer its full support to police departments across the country, including through grants and technical assistance. The Department is confident that the vast majority of police officers across the Nation will continue to vigorously enforce the law and protect the public in full compliance with the Constitution and all applicable federal laws. When bad actors in uniform fail to do so, the Department stands ready to take all necessary action to address any resulting constitutional or civil-rights violations, including via criminal prosecution.

    MIL OSI USA News

  • MIL-OSI Security: The U.S. Department of Justice’s Civil Rights Division Dismisses Biden-Era Police Investigations and Proposed Police Consent Decrees in Louisville and Minneapolis

    Source: United States Attorneys General 13

    Today, the Department of Justice’s Civil Rights Division is beginning the process of dismissing lawsuits against the Louisville, Kentucky and Minneapolis, Minnesota police departments.

    These lawsuits, which were filed at the last minute by the Biden administration after President Donald Trump’s reelection, accused Louisville and Minneapolis of widespread patterns of unconstitutional policing practices by wrongly equating statistical disparities with intentional discrimination and heavily relying on flawed methodologies and incomplete data. They also sought to subject the Louisville and Minneapolis police departments to sweeping consent decrees that went far beyond the Biden administration’s accusations of unconstitutional conduct; the decrees would have governed many aspects of those police departments, including their management, supervision, training, performance evaluations, discipline, staffing, recruitment, and hiring.  In short, these sweeping consent decrees would have imposed years of micromanagement of local police departments by federal courts and expensive independent monitors, and potentially hundreds of millions of dollars of compliance costs, without a legally or factually adequate basis for doing so.

    “Overbroad police consent decrees divest local control of policing from communities where it belongs, turning that power over to unelected and unaccountable bureaucrats, often with an anti-police agenda,” added Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division. “Today, we are ending the Biden Civil Rights Division’s failed experiment of handcuffing local leaders and police departments with factually unjustified consent decrees.”

    The Civil Rights Division will be taking all necessary steps to dismiss the Louisville and Minneapolis lawsuits with prejudice, to close the underlying investigations into the Louisville and Minneapolis police departments, and to retract the Biden administration’s findings of constitutional violations.

    The Civil Rights Division will also be closing its investigations into, and retracting the Biden administration’s findings of constitutional violations on the part of, the following additional local police departments:

    • Phoenix, Arizona
    • Trenton, New Jersey
    • Memphis, Tennessee
    • Mount Vernon, New York
    • Oklahoma City, Oklahoma
    • Louisiana State Police

    The Department of Justice will continue to offer its full support to police departments across the country, including through grants and technical assistance. The Department is confident that the vast majority of police officers across the Nation will continue to vigorously enforce the law and protect the public in full compliance with the Constitution and all applicable federal laws. When bad actors in uniform fail to do so, the Department stands ready to take all necessary action to address any resulting constitutional or civil-rights violations, including via criminal prosecution.

    MIL Security OSI

  • MIL-OSI USA: DOJ Press releases at OCI (Prior Years)

    Source: US Department of Health and Human Services – 3

    05/21/2019
    December 10, 2018: Olympus Medical Systems Corporation, Former Senior Executive Plead Guilty to Distributing Endoscopes After Failing to File FDA-Required Adverse Event Reports of Serious Infections

    03/26/2019
    March 30, 2018: KC Paramedic Indicted for Stealing Fentanyl, Morphine from Ambulances

    03/26/2019
    March 30, 2018: Counterfeit Cigarette Smuggler Sentenced to Prison

    03/20/2019
    April 4, 2018: Canadian Pharmacist Sentenced for Distributing Counterfeit and Adulterated Botox to Local Doctors

    03/20/2019
    March 27, 2018: Compounding Pharmacy Owner Sentenced to Five Years in Prison for $10.5 Million Health Care Fraud

    03/20/2019
    March 27, 2018: Federal Jury Finds Three Guilty in Fentanyl Distribution Conspiracy

    03/20/2019
    April 4, 2018: Fences Indicted in Multi-Million Dollar, Multi-State Criminal Theft Operations

    03/19/2019
    March 30, 2018: Lynn Man Sentenced to Over 10 Years in Prison for Role in Counterfeit Steroid Conspiracy

    03/05/2019
    October 1, 2018: AmerisourceBergen Corp. to Pay $625 Million to Settle Civil Fraud Allegations Resulting from Its Repackaging and Sale of Adulterated Drugs and Unapproved New Drugs, Double Billing and Providing Kickbacks

    03/05/2019
    October 18, 2018: Pharmacist Indicted for Taking Drugs, Carrying Firearm in Violation of Court Order

    03/05/2019
    October 15, 2018: Leader of Fraudulent Prescription Conspiracy Sentenced to Six Years in Prison

    03/05/2019
    November 29, 2018: Two Practitioners Sentenced for Drug Crimes in Connection with HOPE Clinic

    03/05/2019
    December 4, 2018: Medical Device Maker ev3 Agrees to Plead Guilty and Pay $17.9 Million for Distributing Adulterated Device

    03/05/2019
    November 20, 2018: Rochester Man Pleads Guilty to Smuggling Counterfeit Cialis and Viagra into the United States

    03/05/2019
    November 19, 2018: Georgia Man Charged with Social Security and Wire Fraud

    03/05/2019
    October 22, 2018: Medical Equipment Company Agrees to Pay $5.25 Million to Resolve Allegations of Fraudulent Claims for Compounded Medical Creams

    03/05/2019
    October 15, 2018: Four Men and Seven Companies Indicted for Billion-Dollar Telemedicine Fraud Conspiracy, Telemedicine Company and CEO Plead Guilty in Two Fraud Schemes

    03/05/2019
    November 5, 2018: Nurse Sentenced for Taking Fentanyl for Personal Use

    03/05/2019
    November 28, 2018: Former Vice President of Insys Pharmaceuticals Pleads Guilty to Racketeering Scheme

    03/05/2019
    October 18, 2018: Grand Jury Returns Superseding Indictment In Shamo Case; Adds Distribution Of Fentanyl Count Resulting In Death

    03/05/2019
    November 29, 2018: Dietary Supplement Ingredient Importers Arrested in Connection with Large-Scale Smuggling and Money Laundering Scheme

    03/05/2019
    December 4, 2018: Memphis Man Pleads Guilty to Tampering with Consumer Products

    03/05/2019
    October 22, 2018: Oklahoma Orthopedic Company to Pay $455,000 to Settle Claims of False Medical Billing

    02/25/2019
    December 13, 2018: Floridian Pleads Guilty in Complex Fraud Scheme Related to the Processing of Credit Card Payments

    02/25/2019
    December 13, 2018: Owner and Four Former Employees of New England Compounding Center Convicted Following Trial

    02/25/2019
    December 7, 2018: VA Nurse Admits to Fraudulently Obtaining and Tampering with Opioid Prescriptions

    02/25/2019
    December 4, 2018: Des Moines Residents Sentenced for Felony Federal Food, Drug, and Cosmetic Act Offense

    02/13/2019
    October 11, 2018: Two Companies Ordered to Pay More Than $7 Million for Adulterated and Misbranded Pet Food Ingredients

    02/13/2019
    October 4, 2018: Troutdale Doctor Sentenced for Purchasing and Administering Foreign-Sourced Botox and Juvaderm

    09/25/2018
    September 24, 2018: Board Certified Ophthalmologist Agrees to Civil Fraud Settlement in Medicare Fraud Investigation

    09/19/2018
    September 19, 2018: Springfield Doctor Sentenced for Illegally Sharing Patient Medical Files

    09/17/2018
    September 11, 2018: Columbus Pharmacist Sentenced for Health Care Fraud Scheme

    09/17/2018
    September 8, 2017: Galena Biopharma Inc. to Pay More than $7.55 Million to Resolve Alleged False Claims Related to Opioid Drug

    09/10/2018
    September 6, 2018: Cattle Company and Veterinarian Indicted for False Health Certificates on Livestock

    09/06/2018
    August 31, 2018: Former Home Health Nurse Pleads Guilty to Tampering with Patients’ Drugs

    09/04/2018
    August 30, 2018: Massachusetts Man Pleads Guilty to Conspiracy to Distribute Misbranded Prescription Horse Drugs

    08/30/2018
    August 28, 2018: Providence Nurse Sentenced for Tampering with Oxycodone

    08/23/2018
    August 22, 2018: Louisiana Pharmacist Convicted of Trafficking and Selling Stolen Medication

    08/20/2018
    August 17, 2018: Unlicensed Pharmacy Technician Pleads Guilty to Working at New England Compounding Center

    08/16/2018
    August 16, 2018: Genesee County Physician and Two Others Charged with Health Care Fraud

    08/16/2018
    August 15, 2018: Florida Man Pleads Guilty to Scheme to Market Dietary Supplements

    08/06/2018
    August 3, 2018: Northwest ENT Associates, P.C. to Pay Approximately $1.2 Million to Resolve False Claims Act Allegations

    08/01/2018
    July 31, 2018: Three Canadians and their Company Sentenced for Wholesale Distribution of Misbranded Prescription Drugs and Money Laundering

    07/31/2018
    July 30, 2018: Two People Guilty of Distributing Tramadol Pills

    07/30/2018
    July 26, 2018: Miami-Dade Resident Charged in Connection with Performance of Illicit Silicone Injections

    07/24/2018
    July 23, 2018: Springfield EMT/Paramedic Pleads Guilty to Stealing Fentanyl, Morphine

    07/19/2018
    July 18, 2018: Medical Device Maker AngioDynamics Agrees to Pay $12.5 Million to Resolve False Claims Act Allegations

    07/17/2018
    July 17, 2018: Former President of Cumberland Distribution, Inc. Sentenced to 15 Years in Federal Prison for $50 Million Drug Diversion Scheme

    07/12/2018
    July 10, 2018: Pawtucket Woman Sentenced for Participation in Opioid Prescription Conspiracy

    07/11/2018
    July 10, 2018: VA Medical Center Nurse Indicted, Arraigned for Allegedly Tampering with and Stealing Prescription Opioids

    07/11/2018
    July 10, 2018: Former Des Moines Pharmacy Technician Sentenced for Illegally Tampering with Fentanyl

    07/11/2018
    July 10: 2018: Former Pharmacy Technician Indicted for Stealing Fentanyl, Morphine

    07/09/2018
    July 6, 2018: Vero Beach Orthopedic Surgeon Sentenced to Life in Prison Following Conviction for Fentanyl Analog Drug Conspiracy Resulting in Death

    07/09/2018
    July 6, 2018: Internet Business Owner Pleads Guilty to Selling $2.3 Million Worth of Non-FDA Approved and Misbranded Botox and Juvederm-Related Products

    07/05/2018
    July 3, 2018: Canton Man Indicted on Fentanyl and Firearms Charges

    06/28/2018
    June 28, 2018: Southern District of Florida Charges 124 Individuals Responsible for $337 Million in False Billing as Part of National Healthcare Fraud Takedown

    06/22/2018
    June 20, 2018: Fitchburg Woman and Saugus Man Sentenced for Roles in Counterfeit Steroid Conspiracy

    06/18/2018
    June 15, 2018: Theranos Founder and Former Chief Operating Officer Charged in Alleged Wire Fraud Schemes

    06/05/2018
    June 5, 2018: Opioid Prescription Conspiracy Leader Pleads Guilty

    05/31/2018
    May 31, 2018: Notification of Stolen Fertility Drugs: Gonal-f® RFF Redi-ject® and Gonal-f® Multi-Dose

    05/21/2018
    May 21, 2018: Mississippi Man Pleads Guilty to Fraud Scheme Involving the Reselling of Food Products That Were to Be Destroyed

    05/08/2018
    May 8, 2018: Notification of Stolen Octagam

    04/19/2018
    April 13, 2018: Canadian Drug Firm Admits Selling Counterfeit and Misbranded Prescription Drugs Throughout the United States

    04/19/2018
    April 12, 2018: Chinese Citizen Pleads Guilty to Mail Fraud Related to Dietary Supplement Scheme

    04/19/2018
    April 6, 2018: New Hampshire Residents Sentenced for Participating in Scheme to Distribute Misbranded Drugs

    03/15/2018
    March 14, 2018: Meridian Nurse Practitioner Pleads Guilty to Obtaining Controlled Substances by Fraud

    03/14/2018
    March 12, 2018: Champaign, Illinois, Resident Sentenced to One Year in Prison for Producing and Selling Over 80,000 Homemade Tramadol Capsules to Customers without Verifying Prescriptions

    03/13/2018
    March 12, 2018: Pharmacist and Pharmacy Employee Sentenced for Involvement in Over $30 Million Health Care Fraud

    03/08/2018
    March 6, 2018: Monterey Park Woman Sentenced to Two Years in Prison for Injecting Foreign Substance into Woman for Buttocks Enhancement

    03/08/2018
    March 8, 2018: Four Individuals Indicted for Trafficking in Counterfeit Goods

    03/05/2018
    March 2, 2018: Woman Sentenced for Injecting Adulterated Liquid Silicone

    03/05/2018
    February 23, 2018: Lake Charles Veterinarian, Pharmacy Sentenced for In-Race Horse Doping Conspiracy

    03/01/2018
    February 28, 2018: Two Doctors Arrested Pursuant to Federal Indictment That Alleges Bogus Sleep Studies Helped 1-800-Get-Thin Fraudulently Bill Insurance Programs Over $250 Million Related to Lap-Band Surgeries

    02/27/2018
    February 27, 2018: Former President of Houston-Based Drug Company Convicted in $50 Million Drug Diversion Scheme

    02/22/2018
    February 21, 2018: Pharmacy Tech Sentenced to Five Years in Prison for Tampering with Opioids for IV Fluid

    02/21/2018
    February 20, 2018: U.S. Attorney Announces 69-count Indictment Charging Owners, Managers and Physicians Associated with Hope Clinic

    02/21/2018
    February 14, 2018: Palmer Man Sentenced for Conspiring to Import Prescription Drugs from Pakistan

    02/20/2018
    August 19, 2016: Pharmacy Owner and Medical Doctor Charged in an Internet Scheme to Dispense Medications to Customers without Valid Prescriptions

    02/14/2018
    February 14, 2018: Two Indian Citizens and India-based Corporation Sentenced for Conspiring to Smuggle Counterfeit Cigarettes

    02/12/2018
    February 8, 2018: Queensbury Oncologist and Spouse to Pay $500,000 for Submitting False Claims to Medicare for the Administration of Unapproved Cancer Drugs

    02/12/2018
    February 9, 2018: Tampa Resident Convicted for Involvement with Tricare Health Care Fraud Scheme

    02/05/2018
    February 5, 2018: Pennsylvania Firearms Dealer Sentenced To 100 Months Imprisonment

    02/05/2018
    November 25, 2018: Nevada Man Indicted for Distribution of Anabolic Steroids and Drug Misbranding

    02/05/2018
    February 5, 2018: Three Florida Residents Sentenced for Operating an Illegal Steroid and Counterfeit Prescription Drug Lab

    01/31/2018
    January 31, 2018: New England Compounding Center Pharmacist Sentenced for Role in Nationwide Fungal Meningitis Outbreak

    01/24/2018
    September 25, 2017: U.S. Attorney Charges Pharmacy Tech for Tampering with Opioids

    01/24/2018
    January 13, 2017: Two Louisiana Men Sentenced for Roles in On-line Pharmacy Scheme

    01/24/2018
    May 17, 2017: Gardner Man Charged with Conspiracy to Traffic Counterfeit Steroids

    01/24/2018
    December 6, 2016: Two Sentenced for Trafficking in Counterfeit Viagra and Cialis

    01/24/2018
    September 11, 2017: Knoxville Man Pleads Guilty to Conspiring to Defraud the FDA

    01/24/2018
    December 9, 2016: Carroll County Man Pleads Guilty to Federal Conspiracy Charge

    01/24/2018
    July 18, 2016: Cincinnati Man Sentenced for Illegally Importing Drugs into U.S.

    01/24/2018
    July 7, 2016: Johnston Resident Charged with Drug Trafficking, Money Laundering

    01/24/2018
    January 7, 2016: Former Nurse Pleads Guilty to Stealing Narcotics from Hospital

    01/24/2018
    February 15, 2017: Hampton-Based Spice Dealer Sentenced to 17 Years in Prison

    01/24/2018
    July 13, 2017: Four Charged in Counterfeit Body Building Steroid Conspiracy

    01/24/2018
    December 8, 2016: Pharmaceutical Executives Charged in Racketeering Scheme

    01/24/2018
    December 2, 2016: Woman Arrested For Injecting Adulterated Liquid Silicone

    01/24/2018
    September 20, 2017: Registered Nurse Sentenced for Tampering with Fentanyl

    01/24/2018
    June 28, 2017: Registered Nurse Pleads Guilty to Tampering with Fentanyl

    01/24/2018
    June 27, 2016: Hampton-Based Spice Retailer and Wholesaler Pleads Guilty

    01/24/2018
    May 31, 2016: Worcester Nurse Indicted on Federal Drug Tampering Charges

    01/24/2018
    August 7, 2017: Notification of Stolen Sterile Prescription Injectable Products

    01/23/2018
    January 23, 2018: Two Indian Citizens and India-based Corporation Plead Guilty to Conspiring to Smuggle Counterfeit Cigarettes

    01/17/2018
    January 12, 2018: Owner of Seafood Company Charged in Atlantic Blue Crab Scam

    01/17/2018
    September 22, 2017: Drug Maker Aegerion Agrees to Plead Guilty; Will Pay More Than $35 Million to Resolve Criminal Charges and Civil False Claims Allegations

    01/16/2018
    June 30, 2017: Bath County Man Sentenced For Misbranding Drugs and Obstructing Justice

    01/16/2018
    June 21, 2017: Gardner Man Pleads Guilty to Conspiracy to Traffic Counterfeit Steroids

    01/16/2018
    August 28, 2017: Costa Rican Defendant Appears in Federal Court to Face Fraud Charges

    01/16/2018
    July 17, 2017: Leader of $17 Million Health Insurance Fraud Scheme Ordered to Prison

    01/16/2018
    October 11, 2016: Foreign National Pleads Guilty To International Wire Fraud Scheme

    01/16/2018
    August 30, 2017: Two Charged in Federal Court with Smuggling Counterfeit Cigarettes

    01/16/2018
    May 31, 2017: Men Sentenced to Combined 60 Years for Selling Spice in Hampton Roads

    01/12/2018
    December 20, 2016: New England Compounding Center’s National Sales Director Pleads Guilty

    01/12/2018
    July 19, 2017: Texas Man Sentenced to Prison for Conspiring to Import Prescription Drugs

    01/12/2018
    March 13, 2017: Vice-President of SK Labs Found Guilty of Conspiracy, Mail Fraud Charges

    01/12/2018
    December 27, 2016: Providence Nurse Charged in Connection with Tampering with Oxycodone

    01/12/2018
    January 20, 2016: Businessman Sentenced for Marketing and Selling Unapproved Remedies for Cancer

    01/12/2018
    March 2, 2017: Bath County Man Convicted of Obstructing Justice and Selling Misbranded Products

    01/12/2018
    February 6, 2017: Arizona Man Sentenced for Trafficking in Pet Products with Counterfeit Labels

    01/12/2018
    January 17, 2017: Tampa-Area Medical Device Salesman Guilty of Selling Expired Lap-Band Devices

    01/12/2018
    August 1, 2017: Two Kansans Sentenced for Operating Multimillion-Dollar Designer Drug Business

    01/12/2018
    June 2, 2016: Additional Criminal Charges Brought Against Indicted Penn National Horse Trainer

    01/12/2018
    June 15, 2017: Gloucester Woman Charged with Conspiracy to Traffic Steroids and Launder Money

    01/12/2018
    June 15, 2017: Two Kansans Sentenced for Operating Multimillion-Dollar Designer Drug Business

    01/12/2018
    May 15, 2017: Vitamin Shop Owner Guilty of Selling Misbranded Drugs and Controlled Substance

    01/12/2018
    August 15, 2016: Second Trafficker Convicted of Distributing Dangerous Counterfeit Viagra and Cialis

    01/12/2018
    July 17, 2017: Gloucester Woman Pleads Guilty to Her Role in Counterfeit Steroid Trafficking Scheme

    01/12/2018
    October 12, 2016: Colombian National Charged for Unlawfully Injecting Silicone into Victims Bodies

    01/12/2018
    July 28, 2017: Westerly Resident to Plead Guilty to Trafficking Steroids, Money Laundering Charges

    01/12/2018
    September 22, 2016: Hoover Man Charged for Marketing Misbranded Male Enhancement Drugs from China

    01/12/2018
    September, 22, 2016 Hoover Man Charged for Marketing Misbranded Male Enhancement Drugs from China

    01/12/2018
    August 2, 2016: Colombian National Charged for Unlawfully Injecting Silicone into Victims’ Bodies

    01/12/2018
    December 13, 2016: Tampa Resident Indicted for Involvement with Tricare Health Care Fraud Scheme

    01/12/2018
    September 5, 2017: New Hampshire Residents Plead Guilty to Conspiracy Involving Misbranded Drugs

    01/12/2018
    April 3, 2017: Printing and Packaging CEO Pleads Guilty to Trafficking in Counterfeit Labels and Packaging

    01/12/2018
    March 14, 2017: Woman Admits to Causing the Death of Another Person by Injecting Her with Liquid Silicone

    01/12/2018
    April 12, 2017: Former Medical Product Distributor Charged with False Statements about Hormone Shipments

    01/12/2018
    September 29, 2016: New York Man Pleads Guilty To Conspiring To Illegally Manufacture Designer Steroids

    01/12/2018
    July 1, 2016: New Hampshire Couple Indicted On Two Counts Of Illegal Distribution Of Prescription Drugs

    01/12/2018
    September 22, 2017:Woman Admits to Illegally Selling Prescription Drugs Not Approved for Use in the US

    01/12/2018
    June 22, 2016: Former Nurse Sentenced to 82 Months for Stealing and Tampering with Patient Medications

    01/12/2018
    June 13, 2017: Cherry Hill Doctor and Son Admit Defrauding Medicare, Agree To $1.78 Million Settlement

    01/12/2018
    December 19, 2016: New York Man Sentenced to Lengthy Prison Term for Selling Unsafe Dietary Supplements Online

    01/12/2018
    September 25, 2017: Pharmacy Manager Pleads Guilty to Illegal Prescription Drug Diversion and Money Laundering

    01/12/2018
    July 28, 2017: Tampa Woman Sentenced to Prison For Misbranded Drugs Used in Connection with Buttocks Injection

    01/12/2018
    March 28, 2017: Former Atlantic County, New Jersey, Man Charged with Smuggling and Dispensing Misbranded Drugs

    01/12/2018
    September 12, 2017: Former Paramedic Pleads Guilty to Stealing Pain-killing Drugs, Replacing Vials with Water

    01/12/2018
    July 29, 2016: Majority Owner of NECC and Husband Plead Guilty to Illegal Cash Withdrawals Following Outbreak

    01/12/2018
    May 15, 2017: Printing and Packaging Business Owner Convicted of Trafficking in Counterfeit Veterinary Labels

    01/12/2018
    July 14, 2017: Senior Executives of Medical Drug Re-Packager Plead Guilty to Defrauding Healthcare Providers

    01/12/2018
    July 20, 2016: Former Acclarent, Inc. Executives Convicted of Crimes Related to the Sale of Medical Devices

    01/12/2018
    June 6, 2016: Pharmaceutical Companies To Pay $67 Million To Resolve False Claims Act Allegations Relating To Tarceva

    01/12/2018
    February 16, 2017: Atlanta Man Convicted of Illegally Importing and Distributing Male Enhancement Products from China

    01/11/2018
    January 11, 2018: Former New Hampshire Pharmacist Pleads Guilty for Tampering with Narcotics at Bedford Pharmacy

    01/11/2018
    July 22, 2016: Medical Device Manufacturer Acclarent Inc. to Pay $18 Million to Settle False Claims Act Allegations

    01/11/2018
    November 15, 2016: Miami-Dade Resident Sentenced to Fifteen Months in Prison for Distributing Contaminated Cheese

    01/11/2018
    September 25, 2017: Millions of Medicines Seized in Largest INTERPOL Operation Against Illicit Online Pharmacies

    01/11/2018
    January 3, 2017: Notification of Stolen Reckitt Benckiser Retail, Non-Prescription, Consumer Healthcare Products

    01/09/2018
    August 1, 2017: Radford Nurse Who Tampered with Liquid Morphine Intended for Nursing Home Patients Sentenced in Federal Court

    01/09/2018
    November 4, 2016: Two Pakistani Nationals Sentenced for Conspiring to Illegally Ship Pharmaceuticals into the United States

    01/09/2018
    November 29, 2016: Eight Defendants Convicted For Conspiracy to Manufacture and Distribute Counterfeit 5-Hour Energy Drink

    01/09/2018
    September 11, 2017: Three Florida Residents Arrested After Law Enforcement Discover Steroid and Fake Prescription Drug Lab

    01/09/2018
    June 21, 2017: Counterfeiters Sentenced for Convictions in Nationwide Conspiracy to Distribute Fake 5-Hour Energy Drink

    01/09/2018
    May 31, 2017: Drug Trafficking Organization Faces Indictment For Involvment In Manufacturing Fake Prescriptions Drugs With Fentanyl

    01/09/2018
    July 6, 2016: New Jersey Medical Device Manufacturer Admits Selling Contaminated Ultrasound Gel; Court Orders Permanent Injunction

    01/09/2018
    June 26, 2017: Owner of New England Compounding Center Sentenced for Racketeering Leading to Nationwide Fungal Meningitis Outbreak

    01/09/2018
    June 21, 2016: Two Pharmacists Sentenced to Prison for Adulteration of Drugs in Connection with Alabama-Based Compounding Pharmacy

    01/09/2018
    February 14, 2017: Two Miami-Dade Women Charged in Connection with Their Operation of a Spa Performing Illicit Silicone Injections

    01/09/2018
    June 22, 2017: Pharmacy Owner and Director of Compliance Charged with Defrauding United States and Distributing Adulterated Drugs

    01/09/2018
    April 12, 2017: Owners of Two Los Angeles-Area Drug Wholesale Companies Arrested in $20 Million Federal ‘Structuring’ Conspiracy

    01/09/2018
    December 2, 2016: Former Police Officer Sentenced in White Plains Federal Court to 8 Years in Prison for Selling Date Rape Drug

    01/09/2018
    February 7, 2017: Randallstown Woman Pleads Guilty to Injecting Non-Medical Grade Silicone into the Bodies of Victim Customers

    01/09/2018
    August 30, 2017: Miami-Dade Resident Sentenced to More Than 6 Years in Prison for Operating a Miami Spa Performing Illicit Silicone Injections

    01/09/2018
    March 28, 2017: 3 Canadians and their Vancouver Company Charged with Conspiring to Sell Foreign-Made Drugs to Western Pennsylvania Pharmacists

    01/09/2018
    March 9, 2017: Internet Business Owner Indicted for Selling Non-FDA Approved and Misbranded Versions of Botox and Juvederm Related Products

    01/09/2018
    June 8, 2017: Houston, Texas Man convicted of Smuggling Korean Human Growth Hormone Drugs to Local Patients and Professional Wrestlers

    01/09/2018
    February 16, 2017: Oncology Practice, Doctor and Practice Manager Pay $1.7 Million to Resolve Allegations They Billed Medicare for Illegally Imported Drugs

    01/09/2018
    June 27, 2017: Physician and Wife to Pay $1.2 Million to Settle False Claims Act Allegations That They Billed Medicare and Medicaid for Unapproved Drugs

    01/09/2018
    December 13, 2016: O.C. Man Charged with Selling Pet Meds Without a Prescription, Some of Which Were Not Approved for Distribution in the United States

    01/09/2018
    September 6, 2017: Bronx Pharmacist Pleads Guilty To Illegally Selling Millions Of Prescription Pills On The Internet And Agrees To Forfeit $9 Million

    01/09/2018
    November 10, 2016: Nurse Who Operated Spa in Laguna Niguel Agrees to Plead Guilty to Illegally Dispensing Botox Not Approved for Use in United States

    01/09/2018
    March 30, 2017: Lincoln Mother and Son Convicted of Conspiracy to Distribute Misbranded Substances, Drug Paraphernalia, and Related Financial Crimes

    01/09/2018
    January 12, 2017: Baxter Healthcare Corporation to Pay More than $18 Million to Resolve Criminal and Civil Liability Relating to Sterile Products

    01/09/2018
    September 20, 2017: Miami-Dade Resident Sentenced to More Than 4 Years in Prison for Managing a Miami Spa Performing Illicit Silicone Injections

    01/09/2018
    May 23, 2017: Citizen of Pakistan and United Kingdom Sentenced For International Wire Fraud Scheme That Sold False Cures For Multiple Illnesses

    01/09/2018
    April 18, 2017: SCM True Air Technologies, of Ohio and Kentucky, and Its Former Company President – Guilty of Delivering Misbranded Medical Devices from Unregistered Facilities to a Georgia V.A. Medical Center and Obstructing an FDA Investigation into their Conduct

    01/09/2018
    November 28, 2016: Iowa Cancer Clinic and Oncologist to Pay More Than $176,000 To Settle False Claims Act Allegations They Recklessly Billed for Cancer Drugs That Were Unapproved, Misbranded, or Counterfeit and Improperly Upcoded Office Visit Claims

    01/09/2018
    September 9, 2016: Owner of Major Online Colored Contact Lens Business Pleads Guilty in Largest-Ever Investigation of Counterfeit and Misbranded Contact Lenses in the United States

    01/09/2018
    November 7, 2016: Medical Device Maker Biocompatibles Pleads Guilty to Misbranding and Agrees to Pay $36 Million to Resolve Criminal Liability and False Claims Act Allegations

    01/09/2018
    September 26, 2017: Houston, Texas Man Sentenced to 40 Months and a $95,000 Fine for Smuggling Korean Human Growth Hormone Drugs to Local Patients and Professional Wrestlers

    01/09/2018
    December 7, 2016: GNC Enters Into Agreement with Department of Justice to Improve Its Practices and Keep Potentially Illegal Dietary Supplements Out of the Marketplace

    01/09/2018
    September 27, 2017: Amerisourcebergen Specialty Group Pleads Guilty to Distributing Misbranded Drugs and is Sentenced to Pay $260 Million to Resolve Criminal Liability

    01/09/2018
    December 5, 2016: Medical Device Saleswoman Sentenced to Three Years in Prison for Charges Relating to the Transport of Stolen Medical Devices and Money Laundering

    01/09/2018
    May 26, 2017: Florida Woman Sentenced to Federal Prison for Causing the Death of One Victim and Hospitalization of Others by Injecting them With Liquid Silicone

    01/09/2018
    September 11, 2017: Owner of O.C. Pet Products Company Pleads Guilty to Selling Pet Meds without Prescriptions, Some of Which Were Not Approved for U.S. Sale

    09/17/2018
    September 8, 2017: Galena Biopharma Inc. to Pay More than $7.55 Million to Resolve Alleged False Claims Related to Opioid Drug

    01/24/2018
    September 25, 2017: U.S. Attorney Charges Pharmacy Tech for Tampering with Opioids

    01/24/2018
    January 13, 2017: Two Louisiana Men Sentenced for Roles in On-line Pharmacy Scheme

    01/24/2018
    May 17, 2017: Gardner Man Charged with Conspiracy to Traffic Counterfeit Steroids

    01/24/2018
    September 11, 2017: Knoxville Man Pleads Guilty to Conspiring to Defraud the FDA

    01/24/2018
    February 15, 2017: Hampton-Based Spice Dealer Sentenced to 17 Years in Prison

    01/24/2018
    July 13, 2017: Four Charged in Counterfeit Body Building Steroid Conspiracy

    01/24/2018
    September 20, 2017: Registered Nurse Sentenced for Tampering with Fentanyl

    01/24/2018
    June 28, 2017: Registered Nurse Pleads Guilty to Tampering with Fentanyl

    01/24/2018
    August 7, 2017: Notification of Stolen Sterile Prescription Injectable Products

    01/17/2018
    September 22, 2017: Drug Maker Aegerion Agrees to Plead Guilty; Will Pay More Than $35 Million to Resolve Criminal Charges and Civil False Claims Allegations

    01/16/2018
    June 30, 2017: Bath County Man Sentenced For Misbranding Drugs and Obstructing Justice

    01/16/2018
    June 21, 2017: Gardner Man Pleads Guilty to Conspiracy to Traffic Counterfeit Steroids

    01/16/2018
    August 28, 2017: Costa Rican Defendant Appears in Federal Court to Face Fraud Charges

    01/16/2018
    July 17, 2017: Leader of $17 Million Health Insurance Fraud Scheme Ordered to Prison

    01/16/2018
    August 30, 2017: Two Charged in Federal Court with Smuggling Counterfeit Cigarettes

    01/16/2018
    May 31, 2017: Men Sentenced to Combined 60 Years for Selling Spice in Hampton Roads

    01/12/2018
    July 19, 2017: Texas Man Sentenced to Prison for Conspiring to Import Prescription Drugs

    01/12/2018
    March 13, 2017: Vice-President of SK Labs Found Guilty of Conspiracy, Mail Fraud Charges

    01/12/2018
    March 2, 2017: Bath County Man Convicted of Obstructing Justice and Selling Misbranded Products

    01/12/2018
    February 6, 2017: Arizona Man Sentenced for Trafficking in Pet Products with Counterfeit Labels

    01/12/2018
    January 17, 2017: Tampa-Area Medical Device Salesman Guilty of Selling Expired Lap-Band Devices

    01/12/2018
    August 1, 2017: Two Kansans Sentenced for Operating Multimillion-Dollar Designer Drug Business

    01/12/2018
    June 15, 2017: Gloucester Woman Charged with Conspiracy to Traffic Steroids and Launder Money

    01/12/2018
    June 15, 2017: Two Kansans Sentenced for Operating Multimillion-Dollar Designer Drug Business

    01/12/2018
    May 15, 2017: Vitamin Shop Owner Guilty of Selling Misbranded Drugs and Controlled Substance

    01/12/2018
    July 17, 2017: Gloucester Woman Pleads Guilty to Her Role in Counterfeit Steroid Trafficking Scheme

    01/12/2018
    July 28, 2017: Westerly Resident to Plead Guilty to Trafficking Steroids, Money Laundering Charges

    01/12/2018
    September 5, 2017: New Hampshire Residents Plead Guilty to Conspiracy Involving Misbranded Drugs

    01/12/2018
    April 3, 2017: Printing and Packaging CEO Pleads Guilty to Trafficking in Counterfeit Labels and Packaging

    01/12/2018
    March 14, 2017: Woman Admits to Causing the Death of Another Person by Injecting Her with Liquid Silicone

    01/12/2018
    April 12, 2017: Former Medical Product Distributor Charged with False Statements about Hormone Shipments

    01/12/2018
    September 22, 2017:Woman Admits to Illegally Selling Prescription Drugs Not Approved for Use in the US

    01/12/2018
    June 13, 2017: Cherry Hill Doctor and Son Admit Defrauding Medicare, Agree To $1.78 Million Settlement

    01/12/2018
    September 25, 2017: Pharmacy Manager Pleads Guilty to Illegal Prescription Drug Diversion and Money Laundering

    01/12/2018
    July 28, 2017: Tampa Woman Sentenced to Prison For Misbranded Drugs Used in Connection with Buttocks Injection

    01/12/2018
    March 28, 2017: Former Atlantic County, New Jersey, Man Charged with Smuggling and Dispensing Misbranded Drugs

    01/12/2018
    September 12, 2017: Former Paramedic Pleads Guilty to Stealing Pain-killing Drugs, Replacing Vials with Water

    01/12/2018
    May 15, 2017: Printing and Packaging Business Owner Convicted of Trafficking in Counterfeit Veterinary Labels

    01/12/2018
    July 14, 2017: Senior Executives of Medical Drug Re-Packager Plead Guilty to Defrauding Healthcare Providers

    01/12/2018
    February 16, 2017: Atlanta Man Convicted of Illegally Importing and Distributing Male Enhancement Products from China

    01/11/2018
    September 25, 2017: Millions of Medicines Seized in Largest INTERPOL Operation Against Illicit Online Pharmacies

    01/11/2018
    January 3, 2017: Notification of Stolen Reckitt Benckiser Retail, Non-Prescription, Consumer Healthcare Products

    01/09/2018
    August 1, 2017: Radford Nurse Who Tampered with Liquid Morphine Intended for Nursing Home Patients Sentenced in Federal Court

    01/09/2018
    September 11, 2017: Three Florida Residents Arrested After Law Enforcement Discover Steroid and Fake Prescription Drug Lab

    01/09/2018
    June 21, 2017: Counterfeiters Sentenced for Convictions in Nationwide Conspiracy to Distribute Fake 5-Hour Energy Drink

    01/09/2018
    May 31, 2017: Drug Trafficking Organization Faces Indictment For Involvment In Manufacturing Fake Prescriptions Drugs With Fentanyl

    01/09/2018
    June 26, 2017: Owner of New England Compounding Center Sentenced for Racketeering Leading to Nationwide Fungal Meningitis Outbreak

    01/09/2018
    February 14, 2017: Two Miami-Dade Women Charged in Connection with Their Operation of a Spa Performing Illicit Silicone Injections

    01/09/2018
    June 22, 2017: Pharmacy Owner and Director of Compliance Charged with Defrauding United States and Distributing Adulterated Drugs

    01/09/2018
    April 12, 2017: Owners of Two Los Angeles-Area Drug Wholesale Companies Arrested in $20 Million Federal ‘Structuring’ Conspiracy

    01/09/2018
    February 7, 2017: Randallstown Woman Pleads Guilty to Injecting Non-Medical Grade Silicone into the Bodies of Victim Customers

    01/09/2018
    August 30, 2017: Miami-Dade Resident Sentenced to More Than 6 Years in Prison for Operating a Miami Spa Performing Illicit Silicone Injections

    01/09/2018
    March 28, 2017: 3 Canadians and their Vancouver Company Charged with Conspiring to Sell Foreign-Made Drugs to Western Pennsylvania Pharmacists

    01/09/2018
    March 9, 2017: Internet Business Owner Indicted for Selling Non-FDA Approved and Misbranded Versions of Botox and Juvederm Related Products

    01/09/2018
    June 8, 2017: Houston, Texas Man convicted of Smuggling Korean Human Growth Hormone Drugs to Local Patients and Professional Wrestlers

    01/09/2018
    February 16, 2017: Oncology Practice, Doctor and Practice Manager Pay $1.7 Million to Resolve Allegations They Billed Medicare for Illegally Imported Drugs

    01/09/2018
    June 27, 2017: Physician and Wife to Pay $1.2 Million to Settle False Claims Act Allegations That They Billed Medicare and Medicaid for Unapproved Drugs

    01/09/2018
    September 6, 2017: Bronx Pharmacist Pleads Guilty To Illegally Selling Millions Of Prescription Pills On The Internet And Agrees To Forfeit $9 Million

    01/09/2018
    March 30, 2017: Lincoln Mother and Son Convicted of Conspiracy to Distribute Misbranded Substances, Drug Paraphernalia, and Related Financial Crimes

    01/09/2018
    January 12, 2017: Baxter Healthcare Corporation to Pay More than $18 Million to Resolve Criminal and Civil Liability Relating to Sterile Products

    01/09/2018
    September 20, 2017: Miami-Dade Resident Sentenced to More Than 4 Years in Prison for Managing a Miami Spa Performing Illicit Silicone Injections

    01/09/2018
    May 23, 2017: Citizen of Pakistan and United Kingdom Sentenced For International Wire Fraud Scheme That Sold False Cures For Multiple Illnesses

    01/09/2018
    April 18, 2017: SCM True Air Technologies, of Ohio and Kentucky, and Its Former Company President – Guilty of Delivering Misbranded Medical Devices from Unregistered Facilities to a Georgia V.A. Medical Center and Obstructing an FDA Investigation into their Conduct

    01/09/2018
    September 26, 2017: Houston, Texas Man Sentenced to 40 Months and a $95,000 Fine for Smuggling Korean Human Growth Hormone Drugs to Local Patients and Professional Wrestlers

    01/09/2018
    September 27, 2017: Amerisourcebergen Specialty Group Pleads Guilty to Distributing Misbranded Drugs and is Sentenced to Pay $260 Million to Resolve Criminal Liability

    01/09/2018
    May 26, 2017: Florida Woman Sentenced to Federal Prison for Causing the Death of One Victim and Hospitalization of Others by Injecting them With Liquid Silicone

    01/09/2018
    September 11, 2017: Owner of O.C. Pet Products Company Pleads Guilty to Selling Pet Meds without Prescriptions, Some of Which Were Not Approved for U.S. Sale

    12/21/2017
    December 19, 2017: Senior Executives of Medical Drug Repackager Sentenced for Defrauding Healthcare Providers

    12/21/2017
    December 20, 2017: Fitchburg Woman Pleads Guilty to Role in Counterfeit Steroid Conspiracy

    12/18/2017
    December 18, 2017: Cherry Hill Doctor and Son Sentenced to Prison for Defrauding Medicare

    12/14/2017
    December 12, 2017: Iserve Technologies, Inc. Pled Guilty in Connection with Guilty Pleas of Former Exec and Manager of Med-Fast Pharmacy Inc.

    12/04/2017
    November 30, 2017: Lynn Man Pleads Guilty to Counterfeit Steroid Conspiracy

    12/04/2017
    November 30, 2017: Paramedic Sentenced for Stealing Fentanyl from Ambulance Company

    12/04/2017
    November 28, 2017: Champaign, Illinois, Resident Guilty of Producing and Selling Over 80,000 Homemade Tramadol Capsules to Customers Without Verifying Prescriptions

    12/04/2017
    November 29, 2017: Knoxville Man Sentenced for Conspiring to Defraud the FDA

    11/27/2017
    November 21, 2017: Williamsville Couple Pleads Guilty

    11/27/2017
    November 22, 2017: Former Pharmacy Compliance Director Pleads Guilty to Introducing Adulterated Drugs into Interstate Commerce and Conspiracy to Defraud the United States

    11/27/2017
    November 20, 2017: Vitamin Shop Owner Sentenced for Misbranded Drugs and Controlled Substance Conviction

    11/21/2017
    November 20, 2017:Queensbury Oncologist and Office Manager Plead Guilty in Connection with Administering Unapproved Drugs

    11/21/2017
    November 16, 2017: Palmer Man Pleads Guilty to Conspiring to Import Prescription Drugs from Pakistan

    11/20/2017
    November 7, 2017: Federal Jury Convicts Lake Charles Veterinarian, Pharmacy in Race Horse Doping Conspiracy

    11/06/2017
    November 3, 2017: Vero Beach Orthopedic Surgeon Charged in Drug Conspiracy Resulting in Death

    11/06/2017
    November 3, 2017: Five Charged in Alleged Opioid Prescription, Healthcare Fraud Scheme

    11/06/2017
    November 1, 2017: New York Man Pleads Guilty to Selling Misbranded Animal Drugs Containing Steroids

    11/01/2017
    November 1, 2017: FDA Supervisor and Local Businessman Charged in Bribery Scheme

    11/01/2017
    November 1, 2017: Pair Sentenced on Federal Conspiracy

    10/31/2017
    October 31, 2017: South Korean Maker of Contact Lenses, Company CEO Charged with Smuggling Products into U.S. by Failing to Declare Full Value

    10/31/2017
    March 28, 2017: Oakland Man Pleads Guilty to Role in Conspiracy to Manufacture Counterfeit Drugs

    10/30/2017
    October 27, 2017: Central Kentucky Pharmacist Sentenced for Conspiracy to Distribute Oxycodone and Money Laundering

    10/26/2017
    October 26, 2017: Founder and Owner of Pharmaceutical Company Insys Arrested and Charged with Racketeering

    10/26/2017
    October 25, 2017: Five Chinese Citizens and Four Chinese Companies Indicted in Scheme to Sell Mislabeled Dietary Supplements

    10/26/2017
    October 25, 2017: Supervisory Pharmacist of New England Compounding Center Convicted of Racketeering Leading to Nationwide Fungal Meningitis Outbreak

    10/17/2017
    October 16, 2017: Omak, Washington Nurse Sentenced to Federal Prison for Adulterating and Misbranding Pain Medications

    10/10/2017
    October 4, 2017: Med-Fast Pharmacy Inc. and Former Exec Agree to Resolve Criminal and Civil Charges

    10/03/2017
    October 2, 2017: Compounding Pharmacy Owner Charged with $10 Million Health Care Fraud

    10/02/2017
    September 29, 2017: Randallstown Woman Sentenced To 2 Years In Prison For Injecting Non-Medical Grade Silicone Into The Bodies Of Victim Customers

    09/28/2017
    September 20, 2017: Pair Plead Guilty to Federal Conspiracy Charge

    08/29/2017
    August 28, 2017: Shrewsbury Man Pleads Guilty to Operating Counterfeit Steroid Scheme

    08/18/2017
    August 18, 2017: Former Police Officer Pleads Guilty to Trafficking Steroids, Money Laundering

    07/18/2017
    July 6, 2017: North Olmsted Man Charged with Selling Misbranded Drugs

    07/03/2017
    June 28, 2017: Former VA Nurse Re-Sentenced for Stealing and Tampering with Patient Medications

    07/03/2017
    June 28, 2017: Distributor of Counterfeit Medications Arrested

    06/28/2017
    June 23, 2017: Monterey Park Woman Arrested on Federal Charges after Allegedly Injecting Foreign Substances into Woman for Buttocks Enhancement

    06/26/2017
    June 22, 2017: Paramedic Pleads Guilty to Removing Liquid Fentanyl from Ambulance

    06/19/2017
    June 16, 2017: Leawood Woman Charged With Importing Misbranded Drugs

    06/09/2017
    June 9, 2017: Providence Nurse Pleads Guilty to Tampering with Oxycodone

    04/24/2017
    April 19, 2017: Radford Nurse, Who Tampered with Liquid Morphine Intended for Nursing Home Patients, Pleads Guilty

    04/13/2017
    April 12, 2017: Six Charged with Trafficking Counterfeit Steroids

    04/06/2017
    April 5, 2017: Worcester Nurse Sentenced for Drug Tampering

    03/30/2017
    March 22, 2017: Diamond Bar Man Pleads Guilty to Smuggling ED Drugs that Were Sold as ‘Herbal Enhancement’ Products without Prescriptions

    03/27/2017
    March 22, 2017: Owner of New England Compounding Center Convicted of Racketeering Leading to Nationwide Fungal Meningitis Outbreak

    01/19/2017
    January 18, 2017: Owner of Major Online Colored Contact Lens Business Sentenced to 46 Months in Prison in Largest-Ever Scheme to Import and Sell Counterfeit and Misbranded Contact Lenses Prosecuted in the United States

    01/19/2017
    January 13, 2017: Paramedic Pleads Guilty to Tampering with Drugs

    01/17/2017
    January 11, 2017: Worcester Nurse Pleads Guilty to Drug Tampering

    02/20/2018
    August 19, 2016: Pharmacy Owner and Medical Doctor Charged in an Internet Scheme to Dispense Medications to Customers without Valid Prescriptions

    01/24/2018
    December 6, 2016: Two Sentenced for Trafficking in Counterfeit Viagra and Cialis

    01/24/2018
    December 9, 2016: Carroll County Man Pleads Guilty to Federal Conspiracy Charge

    01/24/2018
    July 18, 2016: Cincinnati Man Sentenced for Illegally Importing Drugs into U.S.

    01/24/2018
    July 7, 2016: Johnston Resident Charged with Drug Trafficking, Money Laundering

    01/24/2018
    January 7, 2016: Former Nurse Pleads Guilty to Stealing Narcotics from Hospital

    01/24/2018
    December 8, 2016: Pharmaceutical Executives Charged in Racketeering Scheme

    01/24/2018
    December 2, 2016: Woman Arrested For Injecting Adulterated Liquid Silicone

    01/24/2018
    June 27, 2016: Hampton-Based Spice Retailer and Wholesaler Pleads Guilty

    01/24/2018
    May 31, 2016: Worcester Nurse Indicted on Federal Drug Tampering Charges

    01/16/2018
    October 11, 2016: Foreign National Pleads Guilty To International Wire Fraud Scheme

    01/12/2018
    December 20, 2016: New England Compounding Center’s National Sales Director Pleads Guilty

    01/12/2018
    December 27, 2016: Providence Nurse Charged in Connection with Tampering with Oxycodone

    01/12/2018
    January 20, 2016: Businessman Sentenced for Marketing and Selling Unapproved Remedies for Cancer

    01/12/2018
    June 2, 2016: Additional Criminal Charges Brought Against Indicted Penn National Horse Trainer

    01/12/2018
    August 15, 2016: Second Trafficker Convicted of Distributing Dangerous Counterfeit Viagra and Cialis

    01/12/2018
    October 12, 2016: Colombian National Charged for Unlawfully Injecting Silicone into Victims Bodies

    01/12/2018
    September 22, 2016: Hoover Man Charged for Marketing Misbranded Male Enhancement Drugs from China

    01/12/2018
    September, 22, 2016 Hoover Man Charged for Marketing Misbranded Male Enhancement Drugs from China

    01/12/2018
    August 2, 2016: Colombian National Charged for Unlawfully Injecting Silicone into Victims’ Bodies

    01/12/2018
    December 13, 2016: Tampa Resident Indicted for Involvement with Tricare Health Care Fraud Scheme

    01/12/2018
    September 29, 2016: New York Man Pleads Guilty To Conspiring To Illegally Manufacture Designer Steroids

    01/12/2018
    July 1, 2016: New Hampshire Couple Indicted On Two Counts Of Illegal Distribution Of Prescription Drugs

    01/12/2018
    June 22, 2016: Former Nurse Sentenced to 82 Months for Stealing and Tampering with Patient Medications

    01/12/2018
    December 19, 2016: New York Man Sentenced to Lengthy Prison Term for Selling Unsafe Dietary Supplements Online

    01/12/2018
    July 29, 2016: Majority Owner of NECC and Husband Plead Guilty to Illegal Cash Withdrawals Following Outbreak

    01/12/2018
    July 20, 2016: Former Acclarent, Inc. Executives Convicted of Crimes Related to the Sale of Medical Devices

    01/12/2018
    June 6, 2016: Pharmaceutical Companies To Pay $67 Million To Resolve False Claims Act Allegations Relating To Tarceva

    01/11/2018
    July 22, 2016: Medical Device Manufacturer Acclarent Inc. to Pay $18 Million to Settle False Claims Act Allegations

    01/11/2018
    November 15, 2016: Miami-Dade Resident Sentenced to Fifteen Months in Prison for Distributing Contaminated Cheese

    01/09/2018
    November 4, 2016: Two Pakistani Nationals Sentenced for Conspiring to Illegally Ship Pharmaceuticals into the United States

    01/09/2018
    November 29, 2016: Eight Defendants Convicted For Conspiracy to Manufacture and Distribute Counterfeit 5-Hour Energy Drink

    01/09/2018
    July 6, 2016: New Jersey Medical Device Manufacturer Admits Selling Contaminated Ultrasound Gel; Court Orders Permanent Injunction

    01/09/2018
    June 21, 2016: Two Pharmacists Sentenced to Prison for Adulteration of Drugs in Connection with Alabama-Based Compounding Pharmacy

    01/09/2018
    December 2, 2016: Former Police Officer Sentenced in White Plains Federal Court to 8 Years in Prison for Selling Date Rape Drug

    01/09/2018
    December 13, 2016: O.C. Man Charged with Selling Pet Meds Without a Prescription, Some of Which Were Not Approved for Distribution in the United States

    01/09/2018
    November 10, 2016: Nurse Who Operated Spa in Laguna Niguel Agrees to Plead Guilty to Illegally Dispensing Botox Not Approved for Use in United States

    01/09/2018
    November 28, 2016: Iowa Cancer Clinic and Oncologist to Pay More Than $176,000 To Settle False Claims Act Allegations They Recklessly Billed for Cancer Drugs That Were Unapproved, Misbranded, or Counterfeit and Improperly Upcoded Office Visit Claims

    01/09/2018
    September 9, 2016: Owner of Major Online Colored Contact Lens Business Pleads Guilty in Largest-Ever Investigation of Counterfeit and Misbranded Contact Lenses in the United States

    01/09/2018
    November 7, 2016: Medical Device Maker Biocompatibles Pleads Guilty to Misbranding and Agrees to Pay $36 Million to Resolve Criminal Liability and False Claims Act Allegations

    01/09/2018
    December 7, 2016: GNC Enters Into Agreement with Department of Justice to Improve Its Practices and Keep Potentially Illegal Dietary Supplements Out of the Marketplace

    01/09/2018
    December 5, 2016: Medical Device Saleswoman Sentenced to Three Years in Prison for Charges Relating to the Transport of Stolen Medical Devices and Money Laundering

    12/15/2016
    December 13, 2016: Conagra Subsidiary Sentenced in Connection with Outbreak of Salmonella Poisoning Related to Peanut Butter

    12/13/2016
    December 9, 2016: Two South Florida Residents Charged with Conspiring to Misbrand and Sell Expired Gastric Banding Systems

    11/21/2016
    November 18, 2016: Palm Harbor Oncologist Convicted Of Buying Unapproved Cancer Medications From Foreign Sources And Defrauding Medicare

    11/08/2016
    November 4, 2016: University Hospital Nurse Arrested Following Grand Jury Indictment for Illegally Obtaining and Tampering with Fentanyl and Hydomorphone

    10/17/2016
    October 11, 2016: Florida Man Pleads Guilty to Manufacturing, Distributing Performance Enhancing Drugs

    09/26/2016
    September 9, 2016: Medical Device Saleswoman Convicted on Charges of Conspiring to Transport Stolen Medical Devices in Interstate Commerce, Money Laundering and Other Charges

    08/19/2016
    August 19,2016: North Carolina Man Sentenced to 14 Years in Federal Prison for Providing Silicone Buttocks Injections Resulting in the Death of a Client

    07/26/2016
    July 25, 2016: Three Charged with Manufacturing, Distributing Performance Enhancing Drugs

    06/20/2016
    June 20, 2016: R.I. Businessman Pleads Guilty to Running International Scheme to Label and Sell Misbranded Drugs

    06/08/2016
    June 2, 2016: President of Pharmaceutical Companies Sentenced to 60 Months in Prison for Long-Running Scheme to Sell Misbranded and Unapproved Chemotherapy and Other Prescription Drugs

    05/27/2016
    May 26, 2016: Owner of “The Wholesale Source” Convicted for Selling Unsafe Dietary Supplements Online

    05/27/2016
    May 27, 2016: North Carolina Man Admits Receiving and Selling Misbranded Silicone for Buttocks Injections Resulting in the Death of a Client

    05/23/2016
    May 9, 2016: California Man Pleads Guilty to Selling Unapproved Drug in Rhode Island

    05/19/2016
    May 18, 2016: Woman Charged with Illegally Administering Silicone Injections

    05/16/2016
    May 13, 2016: Two Key Players in Illegal Online Pharmacy Scheme Sentenced to Prison

    05/16/2016
    May 12, 2016: Windsor Mill Woman Indicted for Allegedly Injecting Non-Medical Grade Silicone into the Bodies of Victim Customers

    05/09/2016
    May 9, 2016: Owner of Bodybuilding Drug Companies Sentenced for Selling Misbranded Drugs

    05/09/2016
    May 9, 2016: Lodi Oncologist and Office Administrator Pay $300,000 to Settle False Claims Act Allegations

    05/06/2016
    May 5, 2016: Florida Man Sentenced To Prison For Illegal Diet Pill Scheme

    05/05/2016
    May 4, 2016: Former Buffalo Nurse Sentenced For Stealing Pain Medications Intended For Patients From Local Hospital

    05/04/2016
    April 28, 2016: Jury Convicts Former Police Officer For Selling Date Rape Drug

    05/04/2016
    May 3, 2016: Gainesville Physician Convicted of 162 Counts of Health Care Fraud

    05/02/2016
    April 29, 2016: Manhattan U.S. Attorney Announces Arrest Of Black Market Distributor Of Diverted HIV Medications Worth Approximately $4 Million

    04/20/2016
    April 20, 2016: Norfolk Man Pleads Guilty to Illegally Distributing Insulin

    04/14/2016
    April 7, 2016: Former Nurse Sentenced for Stealing Narcotics from Hospital

    04/06/2016
    April 4, 2016: Former Carlsbad Resident Jailed for Sale of Unapproved “Energy Wave” Medical Devices

    03/24/2016
    March 23, 2016: Federal Jury Convicts Destrehan Woman in Scheme to Sell Illegal and Mislabelled Diet Pills

    03/24/2016
    March 23, 2016: Detroit-Area Physician Sentenced to 45 Months in Prison for Role in $5.7 Million Medicare Fraud Scheme

    03/21/2016
    March 18, 2016: Bookkeeper for Online Pharmacy Sentenced to Five Years in Prison for Money Laundering

    03/11/2016
    March 8, 2016: Cincinnati Man Pleads Guilty to Illegally Importing Drugs into U.S.

    03/08/2016
    March 7, 2016: Tehachapi Doctor Sentenced to 6 Months in Prison for Defrauding Patients and Insurers by Implanting Unapproved IUDs

    03/08/2016
    March 4, 2016: First of Seven Defendants Who Operated Illegal Online Pharmacy Sentenced to Prison

    03/04/2016
    March 4, 2016: Mumbai, India, Man Sentenced on Misbranding Charge

    03/03/2016
    March 1, 2016: Principal of Dietary Ingredient Companies Pleads Guilty to Multi-Million Dollar Fraud and Meth Precursor Scheme

    02/29/2016
    February 26, 2016: Florence Man Sentenced for Smuggling and Distributing Prescription Drugs

    02/25/2016
    February 17, 2016: Danville Man Pleads Guilty to Manufacturing and Distributing Illegal Dietary Supplements

    02/24/2016
    February 24, 2016: Former VA Nurse Pleads Guilty To Stealing Controlled Substance From Hospital Syringes

    02/24/2016
    February 17, 2016: Two Men Sentenced For Involvement in Scheme to Distribute Misbranded Drugs

    02/23/2016
    February 10, 2016: Las Vegas Resident Indicted For Running Counterfeit and Misbranded Contact Lens Operation

    02/19/2016
    February 17, 2016: United States And Vermont Doctor Resolve Matter Involving Non-FDA Approved Drugs And False Claims

    02/19/2016
    February 16, 2016: Swedish Medical Center Surgical Tech/Technologist Indicted by Federal Grand Jury in Denver on Charges of Tampering with a Consumer Product and Obtaining a Controlled Substance by Deceit

    02/19/2016
    February 10, 2016: Owner of Cancer Treatment Clinic Convicted of Providing Fraudulent Medical Treatments to Patients

    02/04/2016
    January 28, 2016: Federal Criminal Charges Filed Against Two Pharmacists for Adulteration of Drugs in Connection with Alabama-Based Compounding Pharmacy

    02/02/2016
    February 1, 2016: Pakistani Man Makes Appearance in U.S. District Court in Denver Following Indictment and Arrest for Sale and Distribution of New, Misbranded and Counterfeit Prescription Drugs

    02/02/2016
    February 1, 2016: Worcester Nurse Sentenced for Stealing Oxycodone from Patients

    02/02/2016
    January 22, 2016: Counterfeit Cigarette Smuggler Receives Jail Sentence

    02/02/2016
    January 5, 2016: Two Defendants Sentenced to Prison in Conspiracy to Distribute Over $6.6 Million in Contraband Cigarettes

    MIL OSI USA News

  • MIL-OSI Economics: Microsoft leads global action that’s disrupting a favored cybercrime tool

    Source: Microsoft

    Headline: Microsoft leads global action that’s disrupting a favored cybercrime tool

    Microsoft’s Digital Crimes Unit (DCU) and international partners are disrupting the leading tool used to indiscriminately steal sensitive personal and organizational information to facilitate cybercrime. On Tuesday, May 13, Microsoft’s DCU filed a legal action against Lumma Stealer (“Lumma”), which is the favored info-stealing malware used by hundreds of cyber threat actors. Lumma steals passwords, credit cards, bank accounts, and cryptocurrency wallets and has enabled criminals to hold schools for ransom, empty bank accounts, and disrupt critical services.

    Via a court order granted in the United States District Court of the Northern District of Georgia, Microsoft’s DCU seized and facilitated the takedown, suspension, and blocking of approximately 2,300 malicious domains that formed the backbone of Lumma’s infrastructure. The Department of Justice (DOJ) simultaneously seized the central command structure for Lumma and disrupted the marketplaces where the tool was sold to other cybercriminals. Europol’s European Cybercrime Center (EC3) and Japan’s Cybercrime Control Center (JC3) facilitated the suspension of locally based Lumma infrastructure.

    Between March 16, 2025, and May 16, 2025, Microsoft identified over 394,000 Windows computers globally infected by the Luma malware. Working with law enforcement and industry partners, we have severed communications between the malicious tool and victims. Moreover, more than 1,300 domains seized by or transferred to Microsoft, including 300 domains actioned by law enforcement with the support of Europol, will be redirected to Microsoft sinkholes. This will allow Microsoft’s DCU to provide actionable intelligence to continue to harden the security of the company’s services and help protect online users. These insights will also assist public- and private-sector partners as they continue to track, investigate, and remediate this threat. This joint action is designed to slow the speed at which these actors can launch their attacks, minimize the effectiveness of their campaigns, and hinder their illicit profits by cutting a major revenue stream.

    Heat map detailing global spread of Lumma Stealer malware infections and encounters across Windows devices.
    Splash page displayed on 900+ domains seized by Microsoft. 

    What is Lumma?

    Lumma is a Malware-as-a-Service (MaaS), marketed and sold through underground forums since at least 2022. Over the years, the developers released multiple versions to continually improve its capabilities. Microsoft Threat Intelligence shares more details around the delivery techniques and capabilities of Lumma in a recent blog.

    Typically, the goal of Lumma operators is to monetize stolen information or conduct further exploitation for various purposes. Lumma is easy to distribute, difficult to detect, and can be programmed to bypass certain security defenses, making it a go-to tool for cybercriminals and online threat actors, including prolific ransomware actors such as Octo Tempest (Scattered Spider). The malware impersonates trusted brands, including Microsoft, and is deployed via spear-phishing emails and malvertising, among other vectors.

    For example, in March 2025, Microsoft Threat Intelligence identified a phishing campaign impersonating online travel agency Booking.com. The campaign used multiple credential-stealing malware, including Lumma, to conduct financial fraud and theft. Lumma has also been used to target gaming communities and education systems and poses an ongoing risk to global security, with reports from multiple cybersecurity companies outlining its use in attacks against critical infrastructure, such as the manufacturing, telecommunications, logistics, finance, and healthcare sectors.

    Example of phishing email impersonating Booking.com and fake CAPTCHA verification prompt. (Source:Microsoft – Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware)

    The primary developer of Lumma is based in Russia and goes by the internet alias “Shamel.” Shamel markets different tiers of service for Lumma via Telegram and other Russian-language chat forums. Depending on what service a cybercriminal purchases, they can create their own versions of the malware, add tools to conceal and distribute it, and track stolen information through an online portal.

    Different tiers of service for Lumma, as well as Lumma’s logo used on marketing material. (Source: Darktrace – The Rise of MaaS & Lumma Info Stealer)

    In an interview with cybersecurity researcher “g0njxa” in November 2023, Shamel shared that he had “about 400 active clients.” Demonstrating the evolution of cybercrime to incorporate established business practices, he effectively created a Lumma brand, using a distinctive logo of a bird to market his product, calling it a symbol of “peace, lightness, and tranquility,” and adding the slogan “making money with us is just as easy.”

    Shamel’s ability to operate openly underscores the importance for countries worldwide to address the issue of safe havens and to advocate for the rigorous enforcement of due diligence obligations under international law.

    Continuing to work together to disrupt prolific cybercrime tools

    Disrupting the tools cybercriminals frequently use can create a significant and lasting impact on cybercrime, as rebuilding malicious infrastructure and sourcing new exploit tools takes time and costs money. By severing access to mechanisms cybercriminals use, such as Lumma, we can significantly disrupt the operations of countless malicious actors through a single action.

    Continued collaboration across industry and government remains imperative. We are grateful for the partnership with others across government and industry, including cybersecurity companies ESET, Bitsight, Lumen, Cloudflare, CleanDNS, and GMO Registry. Each company provided valuable assistance by quickly taking down online infrastructure.

    Finally, we know cybercriminals are persistent and creative. We, too, must evolve to identify new ways to disrupt malicious activities. Microsoft’s DCU will continue to adapt and innovate to counteract cybercrime and help ensure the safety of critical infrastructure, customers, and online users.

    Organizations and individuals can protect themselves from malware like Lumma by using multi-factor authentication, running the latest anti-malware software, and being cautious with attachments and email links. More information for security professionals can be found here.

    Tags: cyberattacks, cybersecurity

    MIL OSI Economics

  • MIL-OSI USA: Wyden Reveals Which Phone Companies Protect Privacy by Telling Customers About Government Surveillance

    US Senate News:

    Source: United States Senator Ron Wyden (D-Ore)
    May 21, 2025
    Wyden Inquiry Also Finds Wireless Carriers Did Not Follow Through on Requirement to Notify Senate of Surveillance Demands
    Washington, D.C. – U.S. Senator Ron Wyden, D-Ore., today revealed which wireless carriers protect the privacy of their customers by notifying them about government surveillance requests for their information, in a letter he sent to his colleagues today. He urged senators to choose a phone company that will notify them about government surveillance requests. 
    “If law enforcement officials, whether at the federal, state, or even local level, can secretly obtain Senators’ location data or call histories, our ability to perform our constitutional duties is severely threatened,” Wyden wrote. “This kind of unchecked surveillance can chill critical oversight activities, undermine confidential communications essential for legislative deliberations, and ultimately erode the legislative branch’s co-equal status.”
    Wyden referenced a 2024 report by the Department of Justice (DOJ) Inspector General, which revealed that during the first Trump Administration, the DOJ secretly obtained the phone records of several members of Congress and dozens of congressional staff, both Republican and Democrats, as part of a leak investigation.
    Wyden learned that the largest phone companies — Verizon, AT&T, and T-Mobile — failed to establish systems to notify senators about government surveillance requests in violation of their contracts with the Senate. He urged senators and staff to consider switching mobile carriers for their campaign and personal phones to carriers that will notify them about government surveillance demands.
    “While AT&T and Verizon only provide notice of surveillance of phone lines paid for by the Senate, T-Mobile has informed my staff that it will provide notice for Senators’ campaign or personal lines flagged as such by the [Senate Sergeant at Arms],” Wyden wrote. “Three other carriers — Google Fi Wireless, U.S. Mobile, and Cape — have policies of notifying all customers about government demands whenever they are allowed to do so. The latter two companies adopted these policies after outreach from my office.”
    Beyond members of Congress, journalists, political activists, people seeking reproductive health care and other law-abiding Americans who could be targeted by the government all have reason to be concerned about secret surveillance of their communications and location data.  Wyden’s office also surveyed phone carriers to learn which companies notify their customers about surveillance. His findings are summarized in the chart below. While it is the norm among tech companies to notify customers about government demands, absent a gag order issued by a judge, most phone companies choose to not notify their customers.

    MIL OSI USA News

  • MIL-OSI: ESET takes part in global operation to disrupt Lumma Stealer, one of the most prevalent infostealers

    Source: GlobeNewswire (MIL-OSI)

    • ESET took part in a globally coordinated operation to disrupt Lumma Stealer.
    • The operation, led by Microsoft, targeted Lumma Stealer infrastructure, including all known C&C servers from the past year, making the botnet, in large part, inoperative.
    • Lumma Stealer has been one of the most prevalent infostealers over the past two years.
    • ESET provided both technical analysis and statistical information, and extracted essential data from tens of thousands of samples, as Lumma Stealer developers had been actively developing and maintaining the malware.

    PRAGUE and BRATISLAVA, Slovakia, May 21, 2025 (GLOBE NEWSWIRE) — ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a global disruption operation against Lumma Stealer, an infamous Malware-as-a-Service infostealer. The operation targeted Lumma Stealer infrastructure, specifically all known C&C servers of the past year, making the botnet, in large part, inoperative.

    “ESET automated systems processed tens of thousands of Lumma Stealer samples, dissecting them to extract key elements, such as C&C servers and affiliate identifiers. This allowed us to continuously monitor Lumma Stealer’s activity, cluster affiliates, keep track of development updates, and more,” says ESET researcher Jakub Tomanek, who monitors and investigates Lumma Stealer. “Infostealer malware families, like Lumma Stealer, are typically just a foreshadowing of future, much more devastating attacks. Harvested credentials are a valued commodity in the cybercrime underworld, sold by initial access brokers to various other cybercriminals, including ransomware affiliates,” adds Tomanek. Lumma Stealer has been one of the most prevalent infostealers over the past two years, leaving no part of the world untouched.

    Lumma Stealer developers had been actively developing and maintaining the malware. ESET has regularly spotted code updates ranging from minor bugfixes to complete replacement of string encryption and updates to the network protocol. The operators of the botnet also actively maintained the shared network infrastructure. Between 17 June 2024 and 1 May 2025, ESET observed a total of 3,353 unique C&C domains, with an approximate average of 74 new domains emerging each week, including occasional updates to Telegram-based dead drop resolvers. This ongoing evolution underscores the significant threat posed by Lumma Stealer and highlights the importance of the disruption efforts.

    Lumma Stealer adopts the concept of malware as a service, where affiliates pay a monthly fee based on their tier to receive the latest malware builds and the network infrastructure necessary for data exfiltration. The tiered subscription model features price ranges from $250 to $1000 per month, each with increasingly sophisticated features. The operators of Lumma Stealer have also created a Telegram marketplace for affiliates, with a rating system to sell stolen data without intermediaries. Common distribution methods include phishing, cracked software, and other malware downloaders. Lumma Stealer employs a few, but effective, anti-emulation techniques that make analysis as complicated as possible. These techniques are designed to evade detection and hinder the efforts of security analysts.

    Microsoft’s Digital Crimes Unit has facilitated the takedown, suspension, seizure, and blocking of the malicious domains that formed the backbone of Lumma Stealer’s infrastructure via a court order granted by the United States District Court of the Northern District of Georgia. In coordination, the U.S. Department of Justice simultaneously also seized the Lumma Stealer control panel, targeting the Lumma Stealer marketplace – and in turn the purchasers of Lumma Stealer malware. This was coordinated with Europol’s European Cybercrime Center (EC3) as well as Japan’s Cybercrime Control Center (JC3), which facilitated the suspension of locally based Lumma Stealer infrastructure.

    “This global disruption operation was made possible by our long-term tracking of Lumma Stealer. The disruption operation led by Microsoft aimed to seize all known Lumma Stealer C&C domains, making the exfiltration infrastructure of Lumma Stealer non-functional. However, ESET will continue to track other infostealers while closely monitoring for Lumma Stealer activity following this disruption operation,” concludes Tomanek.

    For an overview of the Lumma Stealer ecosystem and both a technical analysis and look at the evolution of Lumma Stealer’s key static and dynamic properties critical to the disruption effort, check out the latest ESET Research blogpost, “ESET takes part in global operation to disrupt Lumma Stealer” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), Bluesky, and Mastodon for the latest news from ESET Research.

    Lumma Stealer detection rate based on ESET telemetry (data since July 2024)

    About ESET
    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown — securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts, and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/3e248b2b-dcbf-42cb-93ac-a4b4668bbc31

    The MIL Network

  • MIL-OSI Security: Missouri Man Sentenced to Over 19 Years in Prison for Transporting Minor for Sex

    Source: Federal Bureau of Investigation FBI Crime News (b)

    ST. LOUIS – U.S. District Henry E. Autrey on Tuesday sentenced a man who admitted transporting a minor across state lines for sex to 230 months in prison.

    Scott M. Arnold-Micke, 48, of Rolla, Missouri met the 17-year-old victim in 2021 and took him to Chicago, where they used drugs and engaged in sexual acts. Arnold-Micke engaged in drug use with the victim on an almost daily basis after Arnold-Micke moved from Sullivan, Missouri to Rolla.

    Arnold-Micke, 48, pleaded guilty in January to one count of transportation of a minor to engage in a criminal sex act.

    The case was investigated by the FBI and the Rolla Police Department with assistance from the Phelps County Sheriff’s Department.  Assistant U.S. Attorney Dianna Edwards prosecuted the case.

    “The FBI is unrelenting when it comes to protecting children,” said Special Agent in Charge Chris Crocker of the FBI St. Louis Division. “I commend those who brought this crime to light in order to get this child predator off the streets and in prison where he belongs.”

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Department of Justice Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
     

    MIL Security OSI

  • MIL-OSI Security: Mexican National Indicted for Allegedly Attempting to Smuggle Over 1100 Pounds of Meth into the U.S. Through Eagle Pass

    Source: Office of United States Attorneys

    DEL RIO, Texas – A federal grand jury in Del Rio returned an indictment charging a Mexican national with four counts related to methamphetamine trafficking.

    According to court documents, Veronica Sanchez-Pineda, 46, of Piedras Negras, Coahuila, Mexico, approached the Eagle Pass Port of Entry in a pickup truck on April 20, allegedly giving Customs and Border Protection officers a negative declaration for contraband including narcotics. A secondary inspection allegedly resulted in the discovery of a crystal-like substance inside an auxiliary tank in the bed of the truck. The liquid was extracted and resulted in a positive test result for the properties of methamphetamine, a criminal complaint alleges. The total approximate weight of the alleged narcotic was 521.03 kg.

    The criminal complaint also alleges that Sanchez-Pineda consented to a search of her cell phone, which contained a text message about a “job” in Eagle Pass as well as screenshots of money transfers between the defendant and another individual. Sanchez-Pineda allegedly admitted to being involved in illegal activity regarding the contents of the auxiliary tank and that she was being compensated in Mexican Pesos.

    Sanchez-Pineda is charged with one count of conspiracy to possess with intent to distribute methamphetamine; one count of possession of methamphetamine with intent to distribute; one count of conspiracy to import methamphetamine; and one count of importation of methamphetamine. She was arrested and made her initial court appearance April 24 before U.S. Magistrate Judge Matthew H. Watters of the U.S. District Court for the Western District of Texas. If convicted, Sanchez-Pineda faces 10 years to life in prison and up to a $10 million fine. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Acting U.S. Attorney Margaret Leachman for the Western District of Texas made the announcement.

    Homeland Security Investigations is investigating the case.

    Assistant U.S. Attorney Warsame Galaydh is prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Silver Spring Man Pleads Guilty to “Sextortion” of More Than 100 Minors Located Throughout the United States and Abroad

    Source: Office of United States Attorneys

    Greenbelt, Maryland – Chase William Mulligan, 28, of Silver Spring, Maryland, pled guilty to two counts of producing child sexual abuse material in federal court. The charges are in connection with a scheme in which he met young girls through social media and internet chat rooms and eventually “sextorted” them.

    Specifically, through the scheme, Mulligan coerced at least 108 girls — ranging from ages 5-17 — to send him sexually explicit photographs and videos of themselves. When the girls told him they no longer wanted to send him sexually graphic images, Mulligan threatened to post the images online or come to their house.

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the guilty plea with Special Agent in Charge William J. DelBagno of the Federal Bureau of Investigation (FBI) – Baltimore Field Office.

    “Mulligan used manipulation, fear, and intimidation to exploit over 100 young victims. Now we must ensure that we send a clear message to Mulligan, and others, that those who abuse the most vulnerable members of our communities will pay a steep price,” Hayes said. “We’re committed to working with our law-enforcement partners to relentlessly pursue, prosecute, and bring to justice those who engage in these deplorable acts.”

    “Chase Mulligan is a depraved and dangerous predator. He used social media to target, viciously threaten, and horribly abuse more than 100 minor victims – one as young as five years old,” DelBagno said. “His abhorrent behavior is not diminished by the fact he was thousands of miles away and never met his victims, rather, it’s the opposite. Despite his distance, he presents a serious threat to any child he can access through the internet. The FBI works diligently every day to find and arrest predators like Mulligan so they can no longer prey on innocent children.”

    As detailed in the plea agreement, between at least 2019 and December 2023, Mulligan used numerous Snapchat, Discord, Roblox, Skype, Omegle, and Instagram accounts to target young girls. He convinced minors living in the United States, Canada, Denmark, Spain, Philippines, Australia, and United Kingdom to produce and send him sexually explicit images.

    Mulligan also directed minors to expose their genital areas and engage in sexual conduct. Additionally, Mulligan coerced multiple girls to urinate on camera, insert objects into their genitalia, and participate in sexual acts with dogs.

    After some victims informed Mulligan that they no longer wished to send him sexually explicit images, he threatened to publicly post the images or come to their homes. Mulligan wanted the victims to send more images depicting increasingly graphic sexual conduct.

    As part of his plea agreement, Mulligan must register as a sex offender in places where he resides, is an employee, and is a student, under the Sex Offender Registration and Notification Act.

    Mulligan is facing a mandatory minimum of 15 years and a statutory maximum of 60 years in federal prison.  U.S. District Judge Theodore C. Chuang scheduled sentencing for Wednesday, August 27, at 2:30 p.m.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, visit www.justice.gov/psc. Click the “Resources” tab on the left side of the page to learn about Internet safety education.

    U.S. Attorney Hayes commended the FBI for its work in the investigation. Ms. Hayes also thanked Assistant U.S. Attorneys Megan S. McKoy and Elizabeth Wright who are prosecuting the case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Missouri Registered Sex Offender Charged with Distributing and Receiving Child Pornography

    Source: Federal Bureau of Investigation FBI Crime News (b)

    KANSAS CITY, Mo. – A Kansas City, Mo., man was indicted by a federal grand jury on charges related to child pornography.

    According to an indictment returned this week, Jeffrey Lynn Petrie, 40, of Kansas City, Mo., was charged with one count of distributing child pornography over the internet in May 2024, and one count of receiving child pornography from Dec. 9, 2024, to Dec. 10, 2024.

    The indictment replaces a complaint originally filed on Friday, April 25, 2025. According to an affidavit filed in support of the criminal complaint, law enforcement officers received a Cybertip reporting that a user, “kinkypopper69,” was uploading video files depicting child sexual abuse materials. Petrie was later identified as the user “kinkypopper69.”

    On April 24, 2025, the FBI conducted a search at Petrie’s residence and seized a cell phone and other electronic devices.

    Petrie is a registered sex offender in Missouri based on prior convictions for child molestation in the 2nd degree.

    The charges contained in this indictment are simply accusations, and not evidence of guilt. Evidence supporting the charges must be presented to a federal trial jury, whose duty is to determine guilt or innocence.

    Under federal statutes, if convicted of distribution and receipt of child pornography, a prison sentence of not less than 15 years and not more than 40 years and a fine of up to $250,000 is authorized on each count. The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes, as the sentencing of the defendant will be determined by the court based on the advisory sentencing guidelines and other statutory factors. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

    This case is being prosecuted by Assistant U.S. Attorney Teresa A. Moore. This case was investigated by the Federal Bureau of Investigation, and the Franklin County, Missouri Sheriff’s Office.

    Project Safe Childhood

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    MIL Security OSI

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI Security: Business Owner Pleads Guilty to Fraud and Money Laundering Schemes

    Source: United States Department of Justice (National Center for Disaster Fraud)

    PHILADELPHIA – United States Attorney David Metcalf announced that Zaven Yeghiazaryan, 44, of Newtown, Pennsylvania, pleaded guilty before the Honorable Gerald J. Pappert to 13 counts of an indictment charging him with conspiracy, health care fraud, wire fraud, and money laundering in connection with his execution of a variety of schemes.

    The charges arose from the defendant’s commission of fraud offenses targeting, among others, government programs, including through the use of shell companies and false identities, between January 2020 and April 2024. The defendant’s fraud offenses targeted two government programs which offered relief during the Covid-19 pandemic: the Small Business Administration’s Economic Injury Disaster Loan program, and the Pandemic Unemployment Assistance Program. In addition, the defendant admitted that he participated in a scheme to defraud the Medicaid program.

    Based upon his guilty pleas to the 13 counts, the defendant faces a maximum possible sentence of 230 years in prison, a three-year period of supervised release, and a $3,250,000 fine, restitution of $334,905 and forfeiture. Sentencing is scheduled for September 4, 2025.

    The case was investigated by the Social Security Administration – Office of the Inspector General, Internal Revenue Service – Criminal Investigation, the United States Postal Inspection Service, Homeland Security Investigations, the Department of Health and Human Services – Office of Inspector General, the United States Department of Labor, the United States Department of Transportation – Office of the Inspector General and the State Department. It is being prosecuted by Assistant United States Attorneys Mary E. Crawley and Special Assistant United States Attorney Megan Curran. 

    MIL Security OSI

  • MIL-OSI USA: ICE, law enforcement partners, arrest 13 Armenian rival members, associates of organized crime syndicates for alleged attempted murder, kidnapping and tens of millions in theft

    Source: US Immigration and Customs Enforcement

    LOS ANGELES – U.S. Immigration and Customs Enforcement and law enforcement partners in California and Florida, arrested 13 alleged members and associates of Armenian organized crime syndicates May 20. Those arrested are charged in five federal complaints with a series of crimes, including attempted murder, kidnapping, illegal firearm possession and thefts estimated to be in millions of dollars related to online retailer shipments.

    “This transnational criminal organization operated with the structure and brutality of an international cartel, inflicting significant harm on public safety and causing substantial damage to legitimate commerce and supply chains,” said ICE Homeland Security Investigations Los Angeles acting Deputy Special Agent in Charge Dwayne Angebrandt.

    Among the defendants charged are Ara Artuni, 41, of Porter Ranch, California who is charged with attempted murder in aid of racketeering, and a rival, Robert Amiryan, 46, of Hollywood, California who is charged with kidnapping.

    The defendants arrested in California are expected to make their initial appearances this afternoon and tomorrow afternoon in United States District Court in downtown Los Angeles.

    Vahan Harutyunyan, 50, of Hollywood, Florida, made his initial appearance earlier today in Fort Lauderdale, Florida and was ordered detained. Two of the remaining defendants, Levon Arakelyan, 45, of Las Vegas, Nevada and Ivan Bojorquez, 33, of Gardena, California are presently detained in state custody on unrelated matters.

    Law enforcement seized approximately $100,000 in cash, three armored vehicles, and 14 firearms during the operation.

    According to affidavits filed with the criminal complaints, Armenian Organized Crime, a Russian mafia-affiliated transnational criminal organization, has made Los Angeles County a center of U.S. operations. Since 2022, two local leaders within the organization, also known as avtoritet, which in Russian means “authority,” allegedly have engaged in a power struggle for control in their territory, resulting in multiple murder attempts and a kidnapping.

    Artuni, an avtoritet, is charged with ordering the attempted murder of Amiryan during the summer of 2023. In retaliation, Amiryan, also an avtoritet, allegedly conspired with members of his own criminal organization to kidnap and torture one of Artuni’s associates in June 2023.

    In addition to attempted murder, Artuni and his criminal enterprise has, since at least 2021, allegedly committed additional crimes, including bank fraud, wire fraud, and “cargo theft” targeting online retailers such as Amazon.com Inc. Artuni Enterprise members and associates enrolled with Amazon as carriers, contracted for trucking routes, and then, while transporting the goods, diverged from the route and stole all or part of the shipment. To date, the Artuni Enterprise has allegedly stolen goods from Amazon worth more than $83 million, according to estimates provided by Amazon.

    The Artuni Enterprise also ran a “credit card bust-out” scheme in which they charged various credit cards to a sham business, then drained the business account before the credit card companies could collect the to-be disputed funds.

    “Today’s arrests reflect that my office and our law enforcement partners are committed to keeping America safe by dismantling transnational criminal organizations,” said United States Attorney Bill Essayli. “Let today’s enforcement action be a warning to criminals: Our communities are not your playground to engage in violence and thuggery.”

    “Investigators from the Burbank Police Department spent hundreds of hours investigating these heinous violent crimes,” said Burbank Police Chief Rafael Quintero. “The Burbank Police Department is grateful for the assistance from its law enforcement partners and the United States Attorney’s Office for their work in holding these individuals accountable for their actions.”

    “Dismantling transnational criminal organizations is at the core of HSI’s mission,” continued Angebrandt. “Through close collaboration with our law enforcement partners, HSI is holding these perpetrators accountable and disrupting their criminal enterprise at every level.”

    A complaint contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty beyond a reasonable doubt in court.

    If convicted of all charges, the defendants will face statutory maximum sentences ranging from 10 years in federal prison to life imprisonment.

    Homeland Security Investigations; The Los Angeles Police Department Major Crimes Division – Transnational Organized Crime Section; the Burbank Police Department; Northridge and Ventura offices; the United States Department of Health and Human Services Office of Inspector General; IRS Criminal Investigation; and the Bureau of Alcohol, Tobacco, Firearms and Explosives are investigating this matter.

    Assistant United States Attorneys Lyndsi Allsop and Kenneth R. Carbajal of the Violent and Organized Crime Section and Tara B. Vavere of the Asset Forfeiture and Recovery Section are prosecuting this case. The Department of Justice Criminal Division’s Violent Crime and Racketeering Section provided substantial assistance.

    Individuals across the world can report suspicious criminal activity to the ICE Tip Line 24 hours a day, seven days a week at 866-DHS-2-ICE. Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE.

    MIL OSI USA News

  • MIL-OSI USA: Durbin Questions Witnesses In Senate Judiciary Committee Hearing On Defending Against Drones

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    May 20, 2025
    Today’s hearing highlighted the growing use of drones and how Congress can strike the right balance in response
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, today questioned witnesses during a Senate Judiciary Committee hearing entitled “Defending Against Drones: Setting Safeguards for Counter Unmanned Aircraft Systems Authorities.” Today’s hearing highlighted the growing use of unmanned aircraft systems (UAS), commonly known as drones, and how Congress can strike the right balance in response. It also examined the existing statutory authorities that enable the Department of Justice (DOJ) and the Department of Homeland Security (DHS) to track, disable, seize, and even shoot down drones. Finally, the hearing also provided an opportunity to consider how to provide sufficient authorities to law enforcement while also safeguarding the national airspace and important privacy rights and civil liberties—including ensuring that actions to counter drones respect First and Fourth Amendment rights and Fifth Amendment due process.
    Durbin began by asking Professor Laura Donohue, Professor of Law at Georgetown University; Director of Georgetown’s Center on National Security and the Law; and Director of the Center on Privacy and Technology, about the balance of protecting privacy and civil liberties, as well as our security, when it comes to the use of UAS.
    According to the Federal Aviation Administration (FAA), there are more than one million drones registered in the United States for commercial and recreational purposes. While most are harmless, UAS can pose serious safety risks when flown near airports, other critical infrastructure, or near mass gatherings like sporting events, parades, or concerts. Drones can also be used by malicious actors including criminals, cartels, terrorist groups, and foreign adversaries.
    “If I were sitting in Wrigley Field… and I saw a drone overhead, I would want to be sure it was a safe and friendly drone. I don’t know that when I’m sitting there. Somebody has to find out or at least ask the question. With over one million drones in our country today… it raises a question of who is going to monitor that activity to make sure these are safe… [and] don’t endanger anyone. At the same time, those drones could be gathering information… and there is a privacy angle there too. Who is protecting the privacy of the people that they are gathering information on?”Durbin said. “How do you balance this?”
    Professor Donohue responded, “As a matter of large scale, outdoor events, most states have regulations and law in place that prohibit the use of drones over large scale events” and noted that many have carveouts that don’t allow others to fly drones over private property without the consent of the property owner themselves. She also noted that the way to balance civil liberties concerns is to make sure there are restrictions.
    Durbin continued by asking Professor Donohue, “Let’s talk about the practical world: you have air traffic controllers monitoring commercial aircraft… but in terms of monitoring actual drone activity to the point of knowing whether it is complying with the state law and if it is not, what to do about it, what’s the answer there? How is it enforced?”
    Professor Donohue responded that both states and the FAA play a role. Currently, DOJ and DHS are also authorized to conduct counter drone operations to protect certain covered facilities and assets related to their missions. However, existing authorities do not sufficiently cover airports, critical infrastructure, or events that federal authorities do not have the capacity or resources to protect. The way to balance these authorities with civil liberties, Professor Donohue noted, is to make sure that there are appropriate restrictions on these authorities.
    Durbin concluded by asking, “Professor Donohue, if counter drone authorities are not drafted carefully, could they permit government authorities to intercept data or communications in violation of the Fourth Amendment?”
    Professor Donohue simply responded, “Yes.”
    Video of Durbin’s questions in Committee is available here.
    Audio of Durbin’s questions in Committee is available here.
    Footage of Durbin’s questions in Committee is available here for TV Stations.
    -30-

    MIL OSI USA News

  • MIL-OSI Security: Three White Supremacists Sentenced to Prison for Racketeering Conspiracy; Two to Serve Life In Prison for Murder

    Source: United States Department of Justice

    WASHINGTON — On May 19, a federal judge sentenced three members of the Aryan Brotherhood prison gang who were convicted at trial of a racketeering (RICO) conspiracy that included multiple murders, drug trafficking, fraud, and robbery.

    Francis Clement, 58, was found guilty by a jury in February of RICO conspiracy and five separate counts of murder in aid of racketeering. Each of these murders was committed while Clement was in state prison. Clement was sentenced to life in prison. There is no parole in the federal system.

    The jury also found Kenneth Johnson, 63, guilty of RICO conspiracy and two counts of murder in aid of racketeering. Johnson was also sentenced to life in prison.

    A third defendant, John Stinson, 70, was found guilty of one count of RICO conspiracy. Stinson, who was already serving a lengthy prison sentence in the California state prison system, was sentenced to 20 years in federal prison.

    According to court documents and evidence presented at trial, between 2016 and 2023, Aryan Brotherhood members and associates engaged in racketeering activity, including murder, conspiracy to murder, fraud, robbery, and drug trafficking crimes. Johnson and Clement, who both held leadership roles in the gang, directed crimes committed by Aryan Brotherhood members both inside and outside of prison using cellphones that had been smuggled into prison. Because of his rank in the gang, Clement received a cut from the illegal drug sales and fraud schemes the Aryan Brotherhood committed. According to trial testimony, the Aryan Brotherhood regularly smuggled drugs, including methamphetamine, into prisons throughout the California prison system, which defendants and other gang members then sold to inmates.

    In October 2020, Johnson and Clement together ordered one murder during the execution of which another individual was also killed. Johnson and Clement also ordered another murder of an individual who was subsequently killed. It was further proven at trial that in February 2022, Clement ordered the murder of an individual and the following month, in March 2022, Clement ordered the murder of two more individuals. For each murder, the killings were ordered because defendants believed the victims either violated gang rules or owed the gang money.

    According to court documents and evidence presented at trial, Stinson was a high-ranking leader of the Aryan Brotherhood and had substantial authority over the enterprise, including sponsoring multiple individuals for membership, resolving disputes among members, and approving the murder of current and former members. During the investigation, Stinson used a contraband cellphone within his prison cell to conduct business on behalf of the Aryan Brotherhood. The jury heard some of these communications from Stinson through court-authorized wiretapped conversations. Evidence was presented that Stinson also engaged in drug trafficking, and that, given his position within the gang, he received a cut of illegal drug sales that took place in prison and out on the street.

    “The convicted defendants led a notorious prison gang that committed ruthless murders, widespread methamphetamine trafficking, and perpetuated a culture of mayhem, fear, and disorder within the prison system that bled into the outside world,” said Matthew Galeotti, Head of the Justice Department’s Criminal Division. “Organized crime within the prison system, enabled by the use of contraband cellphones, endangers American neighborhoods by flooding streets with dangerous drugs. The Criminal Division will continue to pursue crime syndicates, like the Aryan Brotherhood and their facilitators, to ensure they go to prison and the harm they inflict on society ends once incarcerated.”

    “Today’s sentences are yet another blow to the leadership of a violent criminal enterprise run from inside California prisons and spanning multiple counties and states,” said Acting U.S. Attorney Michele Beckwith for the Eastern District of California. “The Aryan Brotherhood has maintained its deadly influence over members, associates and others both inside and outside prison. We are committed to doing everything we can to stop these violent inmates from orchestrating their criminal activities from inside prison walls.”

    “These sentences send a clear message: the walls of a prison do not shield violent gang leaders from justice,” said Acting Director Daniel Driscoll of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). “The Aryan Brotherhood’s leadership operated a brutal criminal enterprise from behind bars — ordering murders, trafficking drugs, and fueling violence in our communities. ATF remains committed to working with our law enforcement partners to dismantle violent gangs wherever they operate and hold their leaders accountable, no matter where they try to hide.”

    The indictment in this case charged 11 defendants with RICO conspiracy and other crimes. There are five defendants awaiting trial and the three defendants have pleaded guilty.

    This case was the product of an extensive investigation by the ATF, with assistance from the Office of Correctional Safety (CDCR), U.S. Marshals Service, Los Angeles County Sheriff’s Department, Pomona Police Department, Torrance Police Department, San Diego Police Department, San Diego Sheriff’s Department, Los Angeles County District Attorney’s Office, and Kern County District Attorney’s Office.

    Assistant U.S. Attorneys Stephanie Stokman and James Conolly for the Eastern District of California are prosecuting the case with the assistance of Trial Attorney Jared Engelking of the Criminal Division’s Violent Crime and Racketeering Section.

    The case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. For more information about Organized Crime Drug Enforcement Task Forces, please visit https://www.justice.gov/ocdetf.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Files Religious Liberty Lawsuit Against Troy, Idaho for Discriminating Against a Small Christian Church

    Source: United States Attorneys General 1

    The Justice Department filed a lawsuit today in the U.S. District Court for the District of Idaho alleging that the City of Troy, Idaho, violated the Religious Land Use and Institutionalized Persons Act (RLUIPA) when it denied a conditional use permit (CUP) application sought by Christ Church, a small evangelical church.

    The lawsuit alleges that Christ Church had outgrown the space where it had been worshipping and was unable to find a space to rent. It then sought a CUP to operate a church in the City’s C-1 zoning district, where nonreligious assembly uses such as clubs, museums, auditoriums, and art galleries were allowed. Local residents vociferously opposed the Church’s CUP application, and many of their written and verbal comments reflected animus against Christ Church’s beliefs. In its denial of the Church’s CUP application, the City cited the fact that the public was “heavily against” it and that the “great majority of the city residents” opposed granting the CUP.

    “RLUIPA unequivocally forbids local governments from deciding zoning matters based on their dislike of certain religious groups,” said Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division. “The Department of Justice will not hesitate to file suit against jurisdictions that discriminate in land use matters on the basis of the applicants’ religious beliefs.”

    The lawsuit alleges that the City’s denial of the CUP imposed a substantial burden on Christ Church and was based on the community’s discriminatory animus against the Church. It also alleges that the City’s zoning code treats religious assembly use worse than nonreligious assembly use.  The lawsuit alleges violations of RLUIPA’s substantial burden, equal terms, and discrimination provisions.

    RLUIPA is a federal law that guards individuals and religious institutions from unduly burdensome, unequal, or discriminatory land use regulations. More information about RLUIPA and the department’s work can be found on the Place to Worship Initiative’s webpage.

    As part of this initiative, the department distributed a letter to state, county, and municipal leaders throughout the country to remind them of their obligations under RLUIPA, including its requirement that land use regulations treat religious assemblies and institutions at least as well as nonreligious assemblies and institutions.

    Individuals who believe they have been subjected to discrimination in land use or zoning decisions may contact the Civil Rights Division’s Housing and Civil Enforcement Section at (833) 591-0291 or may submit a complaint through the RLUIPA complaint portal. More information about RLUIPA, including questions and answers about the law and other documents, may be found at www.justice.gov/crt/about/hce/rluipaexplain.php.

    MIL Security OSI

  • MIL-OSI: ESET Research uncovers Operation RoundPress: Russia-aligned Sednit targets entities linked to the Ukraine war to steal confidential data

    Source: GlobeNewswire (MIL-OSI)

    • ESET researchers uncovered the Operation RoundPress espionage campaign, with Russia-aligned Sednit group most likely behind it.
    • In Operation RoundPress, the compromise vector is a spearphishing email leveraging an XSS vulnerability to inject malicious JavaScript code into the victim’s webmail page. It targets Roundcube, Horde, MDaemon, and Zimbra webmail software.
    • Most victims are governmental entities and defense companies in Eastern Europe, although ESET has observed governments in Africa, Europe, and South America being targeted as well.
    • The payloads are able to steal webmail credentials, and exfiltrate contacts and email messages from the victim’s mailbox.
    • Additionally, SpyPress.MDAEMON is able to set up a bypass for two-factor authentication.

    MONTREAL and BRATISLAVA, Slovakia, May 20, 2025 (GLOBE NEWSWIRE) — ESET researchers have uncovered a Russia-aligned espionage operation, which ESET named RoundPress, targeting webmail servers via XSS vulnerabilities. Behind it is most likely the Russia-aligned Sednit (also known as Fancy Bear or APT28) cyberespionage group, holding the ultimate goal of stealing confidential data from specific email accounts. Most of the targets are related to the current war in Ukraine; they are either Ukrainian governmental entities or defense companies in Bulgaria and Romania. Notably, some of these defense companies are producing Soviet-era weapons to be sent to Ukraine. Other targets include African, EU, and South American governments.

    “Last year, we observed different XSS vulnerabilities being used to target additional webmail software: Horde, MDaemon, and Zimbra. Sednit also started to use a more recent vulnerability in Roundcube, CVE-2023-43770. The MDaemon vulnerability — CVE-2024-11182, now patched — was a zero day, most likely discovered by Sednit, while the ones for Horde, Roundcube, and Zimbra were already known and patched,” says ESET researcher Matthieu Faou, who discovered and investigated Operation RoundPress. Sednit sends these XSS exploits by email; the exploits lead to the execution of malicious JavaScript code in the context of the webmail client web page running in a browser window. Therefore, only data accessible from the target’s account can be read and exfiltrated.

    In order for the exploit to work, the target must be convinced to open the email message in the vulnerable webmail portal. This means that the email needs to bypass any spam filtering, and the subject line needs to be convincing enough to entice the target into reading the email message — abusing well-known news media such as Ukrainian news outlet Kyiv Post or Bulgarian news portal News.bg. Among the headlines used as spearphishing were: “SBU arrested a banker who worked for enemy military intelligence in Kharkiv” and “Putin seeks Trump’s acceptance of Russian conditions in bilateral relations”.

    The attackers unleash JavaScript payloads SpyPress.HORDE, SpyPress.MDAEMON, SpyPress.ROUNDCUBE, and SpyPress.ZIMBRA upon the targets. Those are capable of credential stealing; exfiltration of the address book, contacts, and log-in history; and exfiltration of email messages. SpyPress.MDAEMON is able to set up a bypass for two-factor authentication protection; it exfiltrates the two-factor authentication secret and creates an app password, which enables the attackers to access the mailbox from a mail application.

    “Over the past two years, webmail servers such as Roundcube and Zimbra have been a major target for several espionage groups, including Sednit, GreenCube, and Winter Vivern. Because many organizations don’t keep their webmail servers up to date, and because the vulnerabilities can be triggered remotely by sending an email message, it is very convenient for attackers to target such servers for email theft,” explains Faou.

    The Sednit group — also known as APT28, Fancy Bear, Forest Blizzard, or Sofacy — has been operating since at least 2004. The U.S. Department of Justice named the group as one of those responsible for the Democratic National Committee (DNC) hack just before the 2016 U.S. elections and linked the group to the GRU. The group is also presumed to be behind the hacking of global television network TV5Monde, the World Anti-Doping Agency (WADA) email leak, and many other incidents.

    For a more detailed analysis and technical breakdown of Sednit’s tools used in Operation RoundPress, check out the latest ESET Research blogpost “Operation RoundPress” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

    Map of operation RoundPress targets, according to ESET telemetry

    About ESET

    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown — securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/eee3ee68-80dc-4136-a11d-6f498092f7d1

    The MIL Network

  • MIL-OSI USA: 21 illegal aliens arrested in Bay, Leon County targeted operation

    Source: US Immigration and Customs Enforcement

    PANAMA CITY, Fla. — U.S. Immigration and Customs Enforcement joined the Bay County Sheriff’s Office and other agencies held a joint press conference May 16 to announce the results of a two-day joint-agency operation that resulted in the arrest of 21 illegal aliens.

    The operation with BCSO, ICE Homeland Security Investigations Panama City, ICE Enforcement and Removal Operations Miami-Tallahassee field office, the U.S. Department of Justice, the FBI, the Drug Enforcement Administration, the Bureau of Alcohol, Tobacco, Firearms and Explosives, U.S. Citizenship and Immigration Services, the Panama City Beach Police Department, the Florida Highway Patrol, the Panama City Police Department, and the Florida Department of Law Enforcement, mainly targeted those who overstayed a visa. During the operation, 18 were arrested in Bay County, and three in Leon County, Florida. Those arrested were from India, Venezuela, Nicaragua, Mexico, Guatemala, and Jamaica. Most illegal aliens arrested overstayed temporary visas for tourism and recreation.

    “These people came on legit visas and abused that, which takes away from other people trying to obtain these visas. It’s also a federal crime to enter illegally, and a federal crime to overstay and set up residence when these visas expire,” said ICE Homeland Security Investigations Tallahassee Assistant Special Agent in Charge Nicholas Ingegno. “You can see a group of great people here that have gotten together to meet Sheriff Ford’s priorities, to meet the (Florida) governor’s priorities, and to meet the White House priorities.”

    “Our partnership with ICE strengthens our efforts to keep Bay County safe,” said Sheriff Tommy Ford. “By working alongside federal, state, and local agencies, we’re better equipped to address illegal immigration tied to criminal activity. We look forward to expanding this cooperation through the 287(g) Task Force and Warrant Service Officer programs, giving us more tools to protect our community”

    Four of the illegal aliens arrested entered the United States without inspection by a U.S. immigration official and one has been charged with felony illegal reentry after being previously removed. Sixteen of the illegal aliens arrested entered the county legally under a work, travel, or other visa program with a date assigned to leave the country, but they remained after the expiration date, violating the terms of their visa. Overstaying a visa is an abuse of the immigration system and a violation of federal law.

    Ingegno pointed out the importance of removing people who abused the visa system by reminding everyone, “if you remember, a majority of the hijackers on 9/11 were visa overstays. This means the United States let them into the country and they did not leave when they were supposed to. Then they murdered 3,000 Americans.”

    According to Ford, since Jan. 1, 2025, 178 illegal aliens have been arrested by Bay County law enforcement and had ICE detainers placed on them.

    ICE officials have continually emphasized the agency’s continued focus to identifying public safety and national security threats. Individuals unlawfully present in the United States who are encountered during enforcement operations may be taken into custody and processed for removal in accordance with federal law.

    Members of the public with information about suspected immigration violations or related criminal activity are encouraged to contact the ICE Tip Line at 866-DHS-2-ICE (866-347-2423) or submit information online via the ICE Tip Form.

    For more information about ICE HSI Tampa and ICE ERO Miami and their efforts to enhance public safety in Florida, follow them on X at @HSITampa and ERO Miami.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General Bonta Issues Statement on Court Decision Granting a Preliminary Injunction Against TVUSD’s Curriculum Resolution

    Source: US State of California

    Tuesday, May 20, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    OAKLAND – California Attorney General Rob Bonta today issued the following statement in response to the California Fourth District Court of Appeal’s decision to reverse in part the Riverside County Superior Court’s order denying a preliminary injunction against the Forced Outing Policy and Curriculum Resolution enacted by the Temecula Valley School District (TVUSD) Board of Trustees, with instructions to enter a preliminary injunction as to the Curriculum Resolution. The Court found that the Curriculum Resolution, which widely restricted curricular content as well as discussions of history and current events, was unconstitutionally vague, because “the Resolution’s language is ambiguous, lacks clear definitions, is unclear in scope, is seemingly irreconcilable with state-mandated educational requirements, and contains no enforcement guidelines.” As the appellate decision recognizes, the Curriculum Resolution was dramatically overbroad, including provisions that could be construed to bar lessons about discriminatory Jim Crow laws, segregation, racial inequalities in the criminal justice system, and the civil rights movement. The Court also found that the challenge against TVUSD’s Forced Outing Policy was moot because the Board rescinded the Policy in December, and AB 1955, which prohibits forced outing policies like TVUSD’s, is now in effect. In so doing, the Court clearly stated its expectation that “the Board will act in good faith and follow the law.”

    In October 2024, Attorney General Bonta filed an amicus brief urging the Court to reverse the order denying a preliminary injunction, arguing that (1) the Forced Disclosure Policy violates California’s Equal Protection Clause and (2) the Curriculum Resolution violates students’ right to receive information under the free speech provision of the California Constitution.

    “Every student deserves the right to feel seen, valued, and welcome in their learning environment. This decision reinforces the principle that all students should have access to inclusive, affirming curricula that reflects the diversity of their communities and the richness of our shared history. And it reaffirms that California law protects the rights of transgender students to live authentically and without fear. In California, we recognize the importance of curricula that reflect the full scope of the human experience and all our communities — including through instruction on history, racial and socioeconomic inequality, and other subjects — and equip students with the tools to work towards a more just society. Education is meant to empower students to think critically, challenge injustice, and see themselves, as well as one another, in the narratives that shape our society. Schools have a responsibility in providing environments where all students can thrive. Policies that ban inclusive curricula or forcibly out transgender and gender-nonconforming students not only target some of our most vulnerable youth, but also inflict real harm, undermining students’ well-being and academic success. That’s why at the California Department of Justice, we remain committed to protecting the rights of all students and ensuring that schools remain a welcoming and inclusive place for all.”

    A copy of the decision can be found here.

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Dozens of Illegal Aliens Plead Guilty to National Defense Area Violations in May

    Source: Office of United States Attorneys

    EL PASO, Texas – Beginning in early May, additional criminal charges were filed against individuals who illegally entered or were found illegally in the United States and who had illegally entered the National Defense Area (NDA) that had been established along the U.S.-Mexico border from area bordering New Mexico, through El Paso County, to an area near Fort Hancock. As of May 19, 60 defendants had pleaded guilty and were convicted of these charges.

    Title 50 United States Code (USC) 797 and Title 18 USC 1382 are among the federal statutes that establish criminal penalties for unlawful intrusions into areas designated as National Defense Areas.  Title 50 USC 797 refers to the willful violation of defense property security regulation, which, pursuant to lawful authority, was approved by the Secretary of Defense—or a military commander designated by the Secretary of Defense—for the protection or security of Department of Defense property. Title 18 USC 1382 subjects anyone to criminal penalties who, within the jurisdiction of the U.S., entered upon a military post, fort, or yard—in these cases, the Texas National Defense Area—for a purpose prohibit by law or lawful regulation, that is illegal entry into the U.S.

    “The role of this U.S. Attorney’s Office is to enforce the law and defend the interests of the United States, seek just punishment for those guilty of unlawful behavior, and to administer and enforce the nation’s laws to ensure fair and impartial administration of justice for all Americans,” said Acting U.S. Attorney Margaret Leachman for the Western District of Texas. “These NDA-related charges are brought because the defendants violated of the federal law. These convictions area positive step in the judicial process of deterring illegal immigration, and I am very grateful to our El Paso Division staff and to our federal law enforcement and military partners for their diligent work in securing our borders.”

    These cases are part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    ###

    MIL Security OSI

  • MIL-OSI Security: Portland, Oregon man sentenced to four years in prison for traveling to Seattle believing he would sexually assault children

    Source: Office of United States Attorneys

    Seattle – A 64-year-old Portland, Oregon, man was sentenced today to four years in prison for traveling with the intent to engage in a sexual act with a minor, announced Acting U.S. Attorney Teal Luthy Miller. Marc David McCool was arrested May 16, 2024, when he arrived at a Seattle area hotel, allegedly intending to sexually abuse fictitious 7 and 11-year-old children. U.S. District Judge John C. Coughenour imposed 15 years of supervised release to follow the prison term.

    According to records filed in the case, McCool responded to an ad posted on social media by an undercover law enforcement agent. Over more than six weeks of “chats” via the Kik Messenger App, McCool described his sexual interest in children. Ultimately, McCool arranged to travel to Seattle believing he would sexually abuse two young children. He was arrested after he traveled by train and a rideshare to the meet location. At the time of arrest, he had various items reflective of his sexual interest in abusing children: condoms, baby oil, rope, and stuffed animals.

    Speaking at sentencing McCool said his life has been forever changed. He said he has lost everything and damaged his relationships with everyone he loves. He hopes to get treatment while incarcerated.

    Judge Coughenour commended the resolution of the case.

    The case was investigated by Homeland Security Investigation as part of the Seattle Police Department Internet Crimes against Children Task Force (ICAC).

    The case is being prosecuted by Assistant United States Attorney Cecelia Gregson.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI USA: Durbin Meets With Associate Attorney General Nominee Ahead Of Confirmation Hearing

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    May 19, 2025
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, today released the following statement after meeting with Stanley Woodward, President Trump’s nominee to be the Associate Attorney General of the U.S. Department of Justice:
    “The Department of Justice is reeling from turmoil, as extremist loyalists dismantle longstanding programs and protections to appease the President. DOJ is causing a mass exodus of key staff, canceling hundreds of millions of dollars in grants, and reassigning what little staff is left to bolster the President’s illegal mass deportation scheme—and none of it makes our country safer.
    “The Associate Attorney General oversees many crucial offices and programs under threat. I shared as much with Mr. Woodward, and I look forward to hearing more from him under oath.”
    The Associate Attorney General oversees the Civil Division, Civil Rights Division, Antitrust Division, Tax Division, Environment and Natural Resources Division, Office of Justice Programs, Office on Violence Against Women, Office of Community Oriented Policing Services, Office for Access to Justice, Office of Information Policy, Community Relations Service, United States Trustees Program, and Foreign Claims Settlement Commission.
    -30-

    MIL OSI USA News

  • MIL-OSI USA: Congressman Maxwell Frost Slams Trump Regime for Baseless DOJ Charges Against Rep. McIver

    Source: United States House of Representatives – Representative Maxwell Frost Florida (10th District)

    May 19, 2025

    WASHINGTON, D.C. — Today, Congressman Maxwell Alejandro Frost (FL-10) released a statement in response to the Trump Department of Justice (DOJ) bringing charges against Rep. LaMonica McIver (D-NJ) following her oversight visit to Delaney Hall Detention Facility in Newark, New Jersey where ICE agents put their hands on duly elected officials.

    In a statement, Rep. Frost says:

    “Donald Trump and his allies love to cry ‘weaponization’ when it suits them — but the moment they get the chance, they turn around and have the DOJ file baseless charges against a duly elected Member of Congress for simply carrying out her constitutional duties.”

    “The only thing Congresswoman LaMonica McIver is guilty of is standing up to Trump’s illegal actions and fighting back against the Administration’s cruel abuses of immigrants. Looks like it’s easier to charge and arrest a Black woman doing her job than the literal criminals working for Donald Trump.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Head of Commercial Real Estate Investment Firm Sentenced to 87 Months for $62.8M Investment Fraud Scheme

    Source: United States Department of Justice

    A New York man was sentenced yesterday in the Northern District of Georgia to 87 months in prison and ordered to pay over $45 million in restitution for his role in a scheme to defraud investors in connection with commercial real estate investments in Atlanta, Georgia and Miami, Florida.

    According to court documents, beginning in May 2022, Elchonon “Elie” Schwartz, 46, of New York City, engaged in a scheme to defraud commercial real estate investors that invested through the crowdfunding investment website, CrowdStreet Marketplace. Schwartz raised over $62.8 million from hundreds of investors through CrowdStreet, including approximately $54 million for a large commercial real estate complex in Atlanta, Georgia, and approximately $8.8 million for a mixed-use building in Miami Beach, Florida. When soliciting investments, Schwartz represented to CrowdStreet investors that he would safeguard their funds in segregated bank accounts, not commingle the investors’ money, and only use it to fund the investment in each property.

    Over the course of the scheme, however, Schwartz directed substantially all the CrowdStreet investor money into his personal bank account, personal brokerage account, and accounts for unrelated commercial real estate investments he controlled. He used the CrowdStreet investor funds to purchase luxury watches, invest in stocks and options in his brokerage account, and cover payroll expenses for his unrelated commercial real estate businesses. Ultimately, in mid-July 2023, the two corporate entities that Schwartz had formed to receive funds from CrowdStreet investors both filed for Chapter 11 bankruptcy.

    “Yesterday a federal judge sentenced Elchonon Schwartz to 87 months for defrauding investors out of more than 60 million dollars through lies and deceit as part of a real estate scheme,” said Matthew R. Galeotti, Head of the Criminal Division. “The defendant made fraudulent representations to investors and misappropriated their money to buy luxury watches and to deposit into his brokerage and bank accounts instead of investing it as promised. The Criminal Division remains dedicated to prosecuting fraudsters who steal investors’ hard-earned savings to the fullest extent of the law.”

    “Schwartz’s greed was boundless,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “He callously abused the trust of hundreds of investors to line his own bank accounts, purchase expensive watches, and buy additional luxury items. Schwartz’s sentence reflects our office’s commitment to hold fraudsters accountable for exploiting investors who innocently rely on their false representations.”

    “This sentencing underscores that those who exploit the trust of investors for personal gain will be held accountable,” said Paul Brown, Special Agent in Charge of the FBI Atlanta Field Office. “Mr. Schwartz’s actions caused significant financial harm to hundreds of individuals, and hopefully today’s outcome delivers a measure of justice for the victims.”

    In February 2025, Schwartz pleaded guilty to one count of wire fraud.

    The FBI Atlanta Field Office investigated the case. The Justice Department appreciates the valuable assistance of the U.S. Securities and Exchange Commission’s Division of Enforcement.

    Trial Attorney Matthew F. Sullivan of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Kelly Connors for the Northern District of Georgia prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Florida Ophthalmology Practice Agrees to Pay $615,000 to Resolve Allegations of Fraudulent Claims to Medicare and Medicaid for Cranial Ultrasounds

    Source: United States Department of Justice

    Pinellas Eye Care, P.A. doing business as Gulfcoast Eye Care (“Gulfcoast Eye”), an ophthalmology practice with offices in Pinellas Park, Palm Harbor, and St. Petersburg, Florida, has agreed to pay $615,000 to resolve alleged violations of the False Claims Act and an analogous Florida statute arising from its billing for trans-cranial doppler ultrasounds (“TCDs”) provided through a kickback arrangement with a third party. Gulfcoast Eye has agreed to cooperate with the Justice Department’s ongoing investigations of other participants in the alleged scheme.

    The settlement resolves allegations that Gulfcoast Eye knowingly submitted, and caused the submission of, false claims to Medicare and Medicaid for medically unnecessary TCDs. Gulfcoast Eye and a third-party provider of TCD services performed TCDs on thousands of patients and billed Medicare and Medicaid hundreds of dollars per test. Before the patients received the results of the test, Gulfcoast Eye and the third-party provider identified the patients as having received a serious diagnosis — most commonly of occlusion and stenosis of their cerebral arteries — that could qualify the patient for reimbursement of a TCD by Medicare or Medicaid. However, nearly all patients who received TCDs never had occlusion and stenosis of cerebral arteries, and that diagnosis was accordingly not reflected in the patient’s medical history or in the TCD results. Gulfcoast Eye paid the third-party TCD provider based on the volume or value of tests ordered and referred the patients to the TCD provider’s preferred radiology group for the TCD’s professional component. 

    The United States alleged that, as a result of this scheme, Gulfcoast Eye submitted, or caused the submission of, false claims to Medicare and Medicaid for TCDs that were medically unnecessary, that were premised on false diagnoses, and that resulted from violations of the Anti-Kickback Statute and the Stark Law. Of the $615,000 total settlement amount, $602,046 is to be paid to the United States, and $12,953 is to be paid to the State of Florida for its share of Medicaid, which is a jointly funded federal and state program.

    “Patients trust their healthcare providers to administer reliable and competent care consistent with their medical needs and ethical standards,” said U.S. Attorney Gregory W. Kehoe for the Middle District of Florida. “When this relationship is exploited for personal gain or greed, the integrity of our healthcare system is compromised. We will continue working with our law enforcement partners to protect patients from potential harm and maintain the integrity of our federal programs.”

    “Kickback schemes will always be an investigative priority for the FBI,” said Special Agent in Charge Matthew Fodor of the FBI Tampa Field Office. “Our mission is to protect the American people which includes safeguarding them from deceitful actions threatening our nation’s federal healthcare system.”

    “Kickback arrangements can corrupt legitimate medical decision-making and undermine the integrity of federal healthcare programs,” said Acting Special Agent in Charge Ryan P. Lynch of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG, working with our law enforcement partners, will continue to investigate improper billing and kickback schemes to protect both Medicare and Medicaid as well as those served by these programs.”

    The civil settlement resolved a lawsuit filed under the qui tam or whistleblower provision of the False Claims Act, which permits private parties to file suit on behalf of the United States for false claims and share in a portion of the Government’s recovery. The qui tam was filed by a whistleblower who will receive $116,850 in connection with the settlement.

    The settlement was the result of a coordinated effort between the Civil Division’s Commercial Litigation Branch, Fraud Section, and the U.S. Attorney’s Office for the Middle District of Florida, with assistance from HHS-OIG and the FBI. The United States previously resolved allegations that another ophthalmology practice in Florida engaged in a similar scheme with the same third-party TCD provider.

    The government’s pursuit of this matter illustrates the government’s emphasis on combating healthcare fraud. One of the most powerful tools in this effort is the False Claims Act. Tips and complaints from all sources about potential fraud, waste, abuse, and mismanagement can be reported to HHS at 1-800-HHS-TIPS (800-447-8477).

    Trial Attorney Nelson Wagner in the Civil Division’s Commercial Litigation Branch, Fraud Section, and Assistant United States Attorney Mamie Wise for the Middle District of Florida handled the matter.

    The claims resolved by the settlement are allegations only and there has been no determination of liability. 

    MIL Security OSI

  • MIL-OSI USA: Rep. Dan Goldman’s Statement on Trump Prosecuting Rep. LaMonica McIver

    Source: US Congressman Dan Goldman (NY-10)

    “Patriotic Americans must not be fooled: by charging a sitting member of Congress on completely bogus charges, the Trump Administration is weaponizing the Department of Justice in an unprecedented way to silence and intimidate his political opposition.  

    “This is how banana republics and authoritarian dictatorships work, not the oldest democracy in the world.  

    “My Republican colleagues may be drunk on their own power and convinced of their own baseless accusations of the last administration’s weaponization of the federal government, but their cowardice as President Trump lawlessly attacks their own institution will be a permanent stain on each and every one of them. I recommend that they stand up to this tyranny before it is too late or one of them becomes a defendant in a criminal prosecution. 

    ### 

    MIL OSI USA News

  • MIL-OSI USA: Booker Statement on DOJ’s Charges Against Rep. LaMonica McIver

    US Senate News:

    Source: United States Senator for New Jersey Cory Booker
    Newark, N.J. – This evening, U.S. Senator Cory Booker (D-NJ) issued the following statement:
    “These charges are clearly unfounded. Representative McIver was exercising her legally protected authority as a member of Congress to conduct oversight of a detention center that receives millions of taxpayer dollars. Federal officials unnecessarily escalated what should have been a run-of-the-mill inspection of the facility. In fact, Representative McIver’s actions were so unremarkable that she was invited back inside to finish her tour that day, after these events took place. 
    “Pursuing this case against Representative McIver will divert considerable resources away from serious matters of public safety. The Department of Justice should drop these charges immediately.”

    MIL OSI USA News