OPERA1ER, which also goes by the names DESKTOP-group and Common Raven, traces its roots back to 2016 when it registered its first domain.
It conducts cyber-attacks over the weekends or during public holidays because, according to Mirkasymov, “it is much more difficult to stop fraudulent transactions or stop an attack on these days. Even if someone detects an attempt to withdraw money, during the weekend it is not easy to stop them and get the money back.”
The report says that OPERA1ER is a seasoned threat actor, and once it noticed it was being traced, it deleted its accounts and changed its trails to cover its activity last year. But it resurfaced this year.
Mirkasymov explains: “It correlates with the fact that they spend from three to 12 months from the initial access to money theft. The exact number of the gang members is unknown.”
Source/Read More: [(https://www.biografrica.com/2022/11/14/how-hackers-stole-11-million-from-12-african-countries-overnight/)]
Hi, @yateghteghs,
Thank you for your contribution to the Blurt ecosystem.
Your post was picked for curation by @onchain-curator.
Please consider voting for our Upkeep Proposal by Symbionts.