Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Women break glass ceiling of Russian cybercrime
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Women break glass ceiling of Russian cybercrime
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
cybercrimeRussiaNews

Women break glass ceiling of Russian cybercrime

Tony Glover
November 25, 2024 at 12:22 PM
By Tony Glover Tony Glover
Share
women in russian cybercrime
SHARE

women in russian cybercrime

Contents
Women hackers come from across the former Soviet UnionNo cause for celebration in the West

Women cybercriminals and lady Darknet hackers are now starting to make inroads into the hitherto male-dominated fraternities of Russian-speaking cybercrime. According to the cybersecurity training and certification cooperative, the SANS Institute, women cybercriminals sometimes now pose as men in order to obfuscate their identities as well as to gain credibility among Russian-speaking criminals.

The SANS Institute interviewed one such woman cybercriminal, who is referred to only as a “Confidential Human Source (CHS)” in order to comply with her request for anonymity.

“I often took my boyfriend to in-person meetings,” CHS revealed, shining a new light on a so-far largely unrecognized aspect of cybercrime, the fact that cybercriminals meetings are frequently also conducted offline.

According to SANS: “ Unlike what many might assume, interactions within these illicit circles often go beyond online exchanges and extend into in-person meetings.”

SANS also makes it clear that many Russian-speaking cybercriminals such as CHS may not always be Russian. Just as during the Cold War when most Westerners thought of all countries in the former USSR as simply “Russia”, many modern observers in the West remain similarly confused.

Women hackers come from across the former Soviet Union

“Many cybercriminals involved in Russian-speaking cybercrime are not Russian nationals; they often originate from the Commonwealth of Independent States (CIS) and the broader set of former Soviet Union countries, hold different citizenships or dual citizenships, and/or reside outside of Russia. There are 15 former Soviet Union countries, including Armenia, Azerbaijan, Belarus, Estonia, Georgia, Kazakhstan, Kyrgyzstan, Latvia, Lithuania, Moldova, Russia, Tajikistan, Turkmenistan, Ukraine, and Uzbekistan, “ says SANS.

CHS herself comes from a former Soviet Union country and says that the collapse of the Soviet Union drastically altered her family’s fortunes, leaving them in poverty almost overnight, like many others in that period.

“This drastic shift in our financial situation left a deep impression on me, and from a young age, I started thinking about how to earn money to escape this situation. My skills in computers, math, and the IT degree I eventually earned formed the basis of my decision to pursue cybercrime,” said CHS.

Over time, she told SANS that she fully mastered the mechanics of bank payments within the networks she hacked and engaged in hacking financial institutions, facilitating millions of dollars in transfers. Concurrently, she sold credit card dumps and plastic cards containing this stolen data, eventually enabling her to expand into hacking federal agencies. She found additional ways to profit, such as selling unpublished press releases for insider trading and blueprints from jet propulsion laboratories.

No cause for celebration in the West

But the success of women like CHS in breaking the glass ceiling of the male-dominated world of Russian-speaking cybercrime should be no cause for celebration in the West, as the line between cybercrime and cyber-espionage is becoming increasingly blurred. SANS also quotes the example of Yuliya Vladimirovna Pankratova, a member of the Cyber Army of Russia Reborn (CARR), who was sanctioned on July 19, 2024. Pankratova was identified as the group’s spokesperson, overseeing its operations in multiple breaches, including the compromise of industrial control systems (ICS) belonging to water utilities in towns across the U.S. An attack on the water tanks in Texas was accompanied by informational support via the group’s Telegram channel, which serves as their primary communication platform. On January 18, 2024, the Cyber Army of Russia posted a video showing actors inside a compromised network.

The video began with a woman’s robotic voice saying in Russian, “Hi everyone, today we have US infrastructure facilities, particularly water supply systems. Enjoy the video.” According to SANS, Pankratova is responsible for public relations and managing the group’s Telegram channel and is believed to be the one crafting these messages. The voice used in the video of the attack on Texas’ water tank is also thought to be hers.

TAGGED: Cybersecurity, cybercrime, breach, russia, united states, cyber espionage, critical infrastructure, vulnerability, corporate espionage, women, data leak, sans institute, fraud, soviet union, finance, cyber army of russia reborn, geopolitics, water utility, human resources
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article united states water supply is under cyber threat US water supply threatened by cyber-attacks
Next Article black friday scams on the rise Scammers circling Black Friday shoppers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
GovernmentGeopoliticsNewsCyber Espionage

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
Cyber EspionageSurveillanceSpywareNewsChina

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?