پاداش برای عدالت بابت اطلاعات منجر به شناسایی هویت یا مکان هر فردی که، تحت دستور یا هدایت یک دولت خارجی، با نقض «قانون تقلب و سوءاستفاده رایانهای» (CFAA)، در فعالیتهای سایبری مخرب علیه زیرساختهای اساسی ایالات متحده، مشارکت کند، تا 10 میلیون دلار پاداش در نظر گرفته است.
Sergey Vladimirovich Detistov is an officer of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU) who has conspired with others to engage in a global campaign to deploy destructive malware and take other disruptive actions for the strategic benefit of Russia through unauthorized access to computer networks belonging to U.S. companies and other entities.
He developed components of the NotPetya malware used by the Russian government on June 27, 2017 to infect computer systems of critical infrastructure facilities worldwide. Among the targeted systems were those of U.S. hospitals and medical facilities in the Heritage Valley Health System in Pennsylvania and a large U.S. pharmaceutical manufacturer. These malicious cyber activities enabled the Russian government to damage such facilities and cause nearly $1 billion in financial losses to those and other U.S. entities.
Detistov is a member of the GRU’s Unit 74455, recognized by cybersecurity researchers as “Sandworm Team,” “Telebots,” “Voodoo Bear,” and “Iron Viking.”
He has been charged by U.S. authorities with conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft offenses.
Anyone with information on Sergey Vladimirovich Detistov’s malicious cyber activity should contact Rewards for Justice via the Tor-based tips-reporting channel at: he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion (Tor browser required).