Technology & Innovation

Internet criminals who organized the theft of $ 243 million


Quiet honor A recent graduation student from a secondary school in Danbury, Fair Chayel was about to start studying at the University of Rutgers in New Jersey. In 2022, the “Future Lawyers” program completed, and a story that year on the nice website showed a picture of a smiling child with glasses wearing a Windbreaker Tommy Hilfiger on red polo.

Cental classmates remember that he is shy and a car fan. “He kept himself,” says Marco Dias, who has become a friend of Chetal Junior Year. According to another colleague named Nick Paris, this was true in Chetal until one day in the middle of his first year, when he appeared in school driving the Corvette. “It was a lot in. It was 7:30 am, and everyone was like, What? “Paris says.

Chetal said he made his money in the trading of encryption. Das says that Chittle showed him deals on his phone as evidence one morning during the Homeoom chapter. Once, Chetal rented a large house in Stamford, Conte, and hosted a three -day meeting with friends. “I was on the basement at some point, and I was just dealing with my friends, and I only see him, like, on the sofa, just like his phone, and avoid everyone at the party,” says Dias. “I thought, oh, this is a kind of stranger.” Paris recalls that during a school procession, the police stopped Chical in Lamborghini Urus due to traffic violation. “He literally called his lawyer immediately before answering the police questions, which everyone was like: Wow, this man has, like, something for him. Such a man has dangerous money.”

Independent investigators say Chetal was a secret member of COM, and is also referred to as COMM or Community, an online network of chat groups that have their roots in underground piracy in the 1980s and works as a kind of social networks of electronic criminals or aspiration. In a written statement from a non -relevant situation, the FBI’s undersecretary described as “a variety of individuals, which were organized in different sub -groups, all of whom are coordinated through online communication applications such as Discord and TeleGram to participate in different types of criminal activity.” According to the certificate of the FBI and experts studying com, the activities of the various sub -groups include Swatting, which requires false reports to emergency services or institutions such as schools to operate a police response; SIM, when infiltrators take over the target phone number, sometimes by deceiving customer service representatives; Run attacks, using harmful programs that deprive users or organizers from accessing computer files; The stealing of cryptocurrency. And motivations of corporate.

Alison Nixon, chief research official in Unit 221B, a group of cybersecurity experts, has continued this growing angle of the Internet since 2011, and is widely considered a prominent expert in COM. She says most of COM are young men from Western countries. In group chats, many talk about the college and take lessons in cybersecurity, which they use in their favor, she says. Many portal is through video games like Runscape, Roblox and Grand Theft Auto.

Leave a Reply

Your email address will not be published. Required fields are marked *