Raymond Uadiale, a 41-year-old Microsoft engineer, was accused of playing an important role in a series of ransomware attacks. The prosecution stated that it obtained at least $130,000 in profits by asking the victim for the ransom required to unlock the data. It is reported that Uadiale has joined Microsoft since 2014, but he was infected with another British guy named K!NG, who was infected with the ransomware Reveton from October 2012 to March 2013. Many computers.
In this case, this current Microsoft employee is responsible for obtaining prepaid card information. K!NG uses GreenDot MoneyPak to receive a ransom, and the victim enters the required code on their computer's ransomware interface.
Hackers transferred the funds they had collected from victims to prepaid debit cards, which Uadiale used in the name of Mike Roland.
As shown above, Reveton Ransomware discounts FBI and NSA's name, and flicker victim's computer is locked because of downloading suspicious illegal content.
In order to perform in a real way, ransomware has also applied the logos of several state departments, so that the victims believe it and they willingly pay an unlocking fee.
According to court documents, Uadiale received 30% of the US$130,000, and another 70% was in the hands of K!NG.
Microsoft said that it knows the case, but Uadiale's lawyer argued: "All things are too sudden, but the parties are extremely responsible and cooperate."
The current Nigerian man (now a U.S. citizen) is facing federal money laundering and conspiracy charges, but he refused to plead guilty in both Fort Lauderdale, Florida and the Federal Court.
After paying $100,000 in bail, Uadiale is still free to move.