The U.S. Department of State and the Secret Service have announced a substantial reward of $2.5 million for information leading to the arrest and conviction of Volodymyr Kadariya, a Belarusian national linked to significant cybercrime activities. Kadariya, who has operated under various aliases including “Stalin,” “Eseb,” and “baxus,” is accused of being a key player in the Angler Exploit Kit, a notorious malware distribution network. His activities in this arena spanned from October 2013 to March 2022, during which he was instrumental in running malvertising campaigns that exploited software vulnerabilities to deliver malicious payloads to unsuspecting users.
The Angler Exploit Kit was infamous for its exploitation of outdated software such as Adobe Flash, Java, Silverlight, and Internet Explorer. This exploit kit facilitated the deployment of malware onto victims’ systems through malicious advertisements placed on legitimate websites. Kadariya’s involvement included managing these malicious ads and leveraging the Angler Exploit Kit to distribute a variety of malware, which had a significant impact on global cybersecurity.
Kadariya was indicted in June 2023 for wire and computer fraud, but the indictment was only unsealed on August 12, 2024. This indictment identified him as a co-conspirator with Maksim Silnikau, who was previously arrested and extradited to the United States. Silnikau, known for his creation and operation of the Ransom Cartel, Reveton ransomware, and Angler Exploit Kit, faces multiple charges with potential sentences totaling up to 100 years in prison.
In addition to his involvement with the Angler Exploit Kit, Kadariya employed “scareware” tactics to deceive users into downloading malicious files or disclosing sensitive information. His operations extended to selling stolen data and direct access to compromised systems. With his current whereabouts unknown, the U.S. authorities are offering a $2.5 million reward to incentivize information leading to his capture and prosecution, highlighting the ongoing efforts to combat high-profile cybercriminals.
Reference: