June 21, 2023, 6:39 p.m. | BrianKrebs

Security Boulevard securityboulevard.com

If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good deal of time trying to disguise or "crypt" your malware so that it appears benign to antivirus and security products. In fact, the process of "crypting" malware is sufficiently complex and time-consuming that most serious cybercrooks will outsource this critical function to a handful of trusted third parties. This story explores the history and identity behind Cryptor[.]biz, a long-running crypting service that …

+7.9235059268 antivirus breadcrumbs business cdek constella intelligence consuming crypt[.]guru cybercrime deal fact good gumboldt@gmail.com intel 471 kerens kolumb malicious malicious software malware masscrypt@exploit.im ne'er-do-well news obelisk57@gmail.com pepyak@gmail.com process products security security products sergey y purtov sergey yurievich purtov serious services software spurtov@gmail.com vip crypt web fraud 2.0

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States