America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God'

According to the US Department of Justice, the real 'Fxmsp' hacker is Andrey Turchin, 37, a Kazakh citizen.

Recently, the United States accused Andrey Turchin, a 37-year-old Kazakh citizen of crimes related to hacking into more than 300 organizations and companies across the globe. According to the Justice Department, Turchin is behind the notorious hacker "Fxmsp".

According to the indictment, "Fxmsp", also known as the "Invisible Lord", has sold remote access to hundreds of companies and organizations to other hackers on the black market. Last year, the name "Fxmsp" also appeared in the media when stealing and selling the source code of a series of famous antivirus software such as McAfee, Trend Micro and Symantec for $ 300,000 to $ 1 million.

America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God' Picture 1America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God' Picture 1 US finds out hacker identity nicknamed "Invisible God"

Since 2017, "Fxmsp" has infiltrated companies and subsequently made money by reselling access methods to other hackers. Prices range from a few thousand dollars to hundreds of thousands of dollars, depending on the reputation and size of the victims' businesses as well as the level of system control "Fxmsp" achieves.

Two weeks ago, cybersecurity firm Group-IB also hypothesized that Turchin was the person behind "Fxmsp". Group-IB estimates "Fxmsp" and his group have earned at least US $ 1.5 million by infiltrating businesses, including banks, hotels, retailers and government offices. "Fxmsp" customers will buy access to steal sensitive, confidential information or install ransomware malware on the computer systems of businesses and organizations.

America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God' Picture 2America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God' Picture 2 However, they have not yet captured this hacker

According to US Federal agents, "Fxmsp" identifies its prey by scanning the internet for companies and organizations that turn on remote control protocols. Typically, these computers will be password protected. However, "Fxmsp" will use trial and error to find the right password. "Fxmsp" will then invade the victim's network and install malware to maintain accessibility.

The US Department of Justice has held the identity of "Fxmsp" for a long time, but so far has decided to publish it. The US side also thanked the Kazakh government for its assistance in the investigation process and wishes to catch "Fxmsp" to bring to the US for trial soon.

5 ★ | 1 Vote