He's Ukrainian. He goes by the name "Profexer." And he's allegedly behind the software that kicked off the Great DNC Hacking of 2016—you know080p Archives the one thatmay have swayed an entire American presidential election.
Other personal details about the reportedly young man are vanishingly scarce, according to The New York Times, but its his professional credentials that may illuminate key parts of how the Russian government runs its hacking operations.
SEE ALSO: Pussy Riot wants to totally immerse you in Russian prison lifeProfexer may not have been a Russian government operative himself, but he isthe alleged author of the malware that helped Russian operatives hack the Democratic National Committee (and steal DNC emails) in an attempt to sway the 2016 United States presidential election in favor of President Donald Trump.
So: If the man himself doesn't work for Moscow, then who is he?
If you were one of the few who found themselves adept at uncovering malware code on the Russian-language dark web a few months ago, you might have come across Profexer's work.
Per the Times, his malware, called P.A.S. web shell, was the only one mentioned in the Department of Homeland Security's first report about Russian hacking in the U.S. election. And let's say you were able to find it, by chance? The malware was free. Profexer made his money on the people who wanted customized versions of that free stuff. The man was reportedly respected enough to earn both awe and cash.
Profexer dismantled his dark web site once his malware showed up in the DHS report. Six days later, he reassured fellow hackers that no one had killed him. In a brief debate with another hacker over the possibility of his capture, he said authorities would be able to find him without a problem, "it depends only on politics."
Rather than wait, Profexer walked out from behind his computer. Ukrainian law enforcement didn't arrest him, reportedly because the man behind the malware built it without using it. Officials did, however, acquaint Profexer with the FBI, for whom he is now a witness.
Profexer knows the people who used his malware, but only in the same way we know Profexer—by their screennames.
If he can identify which users were likely Russian operatives, more questions might be answered, and officials might better understand how the Russian government runs cyberoperations. Do they, as The Timessuggested, spend more time looking for useful malware, rather than developing it themselves? Are Russian cyber officials as much crowdsourcers as they are hackers, gathering the best tools they can find before aiming them at their own targets? And was this effective enough to count government subcontracting hacker-built software as the future of diplomatic warfare?
Needless to say: More to come.
Topics Cybersecurity
(Editor: {typename type="name"/})
The 10 Most Anticipated PC Games of 2016
BMW initiates development of L3 autonomous driving in China · TechNode
Major Ant Group investors exit Chinese fintech giant’s share buyback plan · TechNode
Lenovo launches new generation gaming laptop Legion R9000X 2023 · TechNode
New MIT report reveals energy costs of AI tools like ChatGPT
Foxconn’s EV platform unit targets India, Thailand to produce small EVs · TechNode
Oppo turns its iconic green logo black · TechNode
MissFresh to offer marketing services after delisting crisis eliminated · TechNode
China unveils detailed steps to stimulate private sector · TechNode
NYT mini crossword answers for May 12, 2025
Zeekr unveils new pictures of its first supercar with carbon ceramic brakes · TechNode
接受PR>=1、BR>=1,流量相当,内容相关类链接。