Spoke with a guy who sold one variant of Kronos... not elucidating. But it seems Kronos kinda sucked for cybercriminals.https://twitter.com/iblametom/status/893516425742176257 …
-
-
It's all about where the "protected computers" are that were "accessed without authorization." In MWT's case, seems like WI is the place.
-
No. Not really. DOJ has been working at busting cyber out of such niceties.
-
How so? What recent CFAA cases reflect this?
-
1) not clear this is best considered CFAA 2) after weev--quintessential case of such--FBI changed how cyber organized to non geographic
-
1) Agreed 2) Weev was a one off case where they screwed up the venue because it wasn't where the servers were located. Lesson learned.
-
Nah. I think venue questions will/have changed given Rule 41. Witness how they used AK in Kelihos.
-
Something similar could be happening here: sticking MalwareTech in some obscure place while main case is developed in, say, CT.
End of conversation
New conversation -
-
-
The targets must have been in the US. I'm going to take a shot in the dark and say specifically.... somewhere in Wisconsin.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.