Liverpool — Man wanted on province-wide arrest warrant

Source: Royal Canadian Mounted Police

Queens District RCMP is seeking information on the whereabouts of a man currently wanted on a province-wide arrest warrant.

Michael Basil Bolivar, 42, from Forties, Lunenburg County, is currently facing charges of:

  • Assault
  • Theft
  • Failure to Comply with Order

Bolivar is described as 5-foot-10, 160 lbs. He has brown hair and brown eyes.

Investigators have made several attempts to locate Bolivar and are requesting assistance from the public.

Anyone who has information on the whereabouts of Michael Basil Bolivar is asked to refrain from approaching him and to contact the Queens District RCMP at 902-354-5721. To remain anonymous, call Nova Scotia Crime Stoppers, toll-free, at 1-800-222-TIPS (8477), submit a secure web tip at www.crimestoppers.ns.ca, or use the P3 Tips App.

File #: 2024-597901

Tobique First Nation — Seven individuals charged in connection with kidnapping, assault

Source: Royal Canadian Mounted Police

Seven individuals have been arrested and charged in connection with a violent kidnapping and assault in Tobique First Nation.

On the morning of April 29, 2024, members of the Tobique RCMP responded to a report of a kidnapping and assault that occurred in the community.

The victim, a 54-year-old woman from Florenceville, was kidnapped at gun point, held against her will and assaulted. She was treated at hospital with significant, but non-life-threatening injuries, and has since been released.

It was determined through the course of the investigation, led by the West District Community Crime Reduction Unit (CCRU), that a number of individuals were involved. A search warrant was executed on May 6, at a residence on Tobique First Nation.

Since May 6, police have arrested seven individuals in connection with this serious incident.

Between May 6 and May 8, the following individuals appeared in Woodstock Provincial Court.

  • 34-year-old Jacob Perley, of Tobique First Nation
  • 27-year-old Preston Sockabasin, of Tobique First Nation
  • 33-year-old Adam Perley, of Tobique First Nation
  • 32-year-old Keagan Paul, of Tobique First Nation
  • 33-year-old Ashley Paul, of Tobique First Nation
  • 56-year-old Troy Pelkey of Tilley, N.B.
  • 36-year-old Sheena Sappier, of Tobique First Nation

In total, 62 charges were laid. These charges ranged and varied depending on the involvement of each individual, and include:

  • Kidnapping
  • Extortion
  • Assault
  • Assault causing bodily harm
  • Administering a noxious substance
  • Forcible confinement
  • Possession of a prohibited firearm
  • Pointing a firearm
  • Careless use of a firearm

All individuals are remanded into custody, and are scheduled to return to court separately, beginning May 16.

The New Brunswick RCMP would like to thank the community of Tobique First Nation for their ongoing support and cooperation. The RCMP’s Police Dog Services (PDS), and Air Services also assisted with the investigation and arrests.

The investigation is ongoing.

Dauphin — Dauphin RCMP traffic stop leads to seizure of drugs

Source: Royal Canadian Mounted Police

On May 6, 2024, at approximately 5:20 pm, officers with the Dauphin RCMP Detachment conducted a traffic stop on a vehicle located on River Avenue in Dauphin.

In speaking with the driver, it was determined that the 29-year-old male, from Pine Creek First Nation, did not possess a valid drivers license. As the driver was exiting the vehicle, the officer observed drug paraphernalia on the center console in plain view. The driver was immediately placed under arrest and upon his search, officers located a small quantity of drugs believed to be cocaine in his possession.

The three remaining passengers, from Dauphin, in the vehicle were subsequently taken into custody.

The 36-year-old female was placed under arrest and, upon her search, officers located numerous small baggies of a substance believed to be cocaine and crack cocaine.

The two male passengers (53,32) were arrested on scene and, upon their search, officers located drug-related paraphernalia.

A search of the vehicle located additional drugs, cash and drug-related paraphernalia.

The driver and two of the passengers were later released from police custody for a court appearance scheduled for June 25, 2024, in Dauphin where they will each face charges of Possession for the Purpose of Trafficking x2 and Possession of Proceeds of Crime.

Wayne Mckay, 32, was remanded into custody on these same charges.

RCMP urge anyone who may have any information regarding drugs or any other criminal activity, to please contact your local police agency or call Crime Stoppers anonymously at 1-800-222-8477, or submit a secure tip online at www.manitobacrimestoppers.com.

Dauphin RCMP continue to investigate.

3 Arrested in Armed Robbery of Cash Courier

Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

BOSTON – Three men have been arrested and charged in connection with the February 2024 armed robbery of a cash courier in Swansea, Mass. The defendants are charged with robbing courier at gunpoint; zip-tying and pepper spraying victim; then burning the stolen getaway vehicle.

Steven Madison, 38, of Bridgewater; Christopher White, 37, of Raynham; and Quentin McDonald, 35, of Brockton, were each charged with one count of robbery interfering with interstate commerce, commonly referred to as Hobbs Act robbery; one count of arson of property used in or affecting interstate commerce; and one count of conspiracy. In addition, Madison and White were also charged with one count of being a felon in possession of a firearm.

The defendants were arrested yesterday and were detained pending a hearing scheduled for May 13, 2024.

According to the charging documents, in the early morning hours of Feb. 19, 2024, two men were seen on video stealing a rental van from a U-Haul Moving & Storage location in Abington, Mass. Later in the day an armed courier who worked for a company that provides secure cash transportation services for licensed cannabis companies arrived at a bank in Swansea, Mass. carrying approximately $436,200 in cash for deposit. 

It is alleged that the U-Haul van pulled up alongside the courier and a masked man wearing a camouflaged vest exited the van and pointed a firearm at the courier before zip-tying the courier’s hands behind his back. It is further alleged that a second masked man exited the U-Haul van and quickly loaded the cash into the vehicle. After trying to disarm the courier, the two men allegedly forced the courier into the back seat of his own car, pepper sprayed him and closed the door. 

Surveillance footage showed that the courier managed to remove one hand from the zip-tie restraints while inside his vehicle, draw his firearm and fire four rounds in the direction of the U-Haul van as it fled the scene before calling 911.  

After leaving the bank, the men allegedly drove the van to a nearby location in Swansea where they met with a third man driving an SUV. It is alleged that the men then transferred the stolen cash into the getaway SUV, burned the U-Haul van and fled.

A subsequent investigation allegedly identified Madison, White and McDonald as the individuals involved in both the robbery and arson. It is alleged that during a search of Madison’s residence in Bridgewater yesterday morning, an estimated $5,000 or more in cash was located in various amounts throughout the house, as well as a $47,000 Rolex watch, a sweatshirt similar to that worn by one of the robbers, a firearm, and ammunition. Following a search of White’s residence in Raynham, zip-ties, a black mask similar to that worn by one of the robbers, a firearm and ammunition were recovered. 

According to the charging documents, both Madison and McDonald have prior state convictions for masked armed robbery, assault and battery by means of a dangerous weapon, and unlawfully possessing a firearm. White has prior state convictions for larceny and receiving stolen property. 

The charge of Hobbs Act robbery provides for a sentence of up to 20 years in prison, three years of supervised release and a fine of up to $250,000. The charge of arson of property used in or affecting interstate commerce provides for a mandatory minimum sentence of five years and up with 20 years in prison, three years of supervised release and a fine of up to $250,000. The charge of conspiracy provides for a sentence of up to five years in prison, three years of supervised release and a fine of $250,000. The charge of being a felon in possession of a firearm provides for a sentence of up to 15 years in prison, three years of supervised release and a fine of $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

Acting United States Attorney Joshua S. Levy; James M. Ferguson, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms & Explosives, Boston Field Division; John E. Mawn, Jr., Interim Colonel of the Massachusetts State Police; and Swansea Police Chief Mark Foley made the announcement today. Valuable assistance was provided by the Bristol County District Attorney’s Office and the Bridgewater, Brockton and Raynham Police Departments. Assistant U.S. Attorney John J. Reynolds III of the Major Crimes Unit is prosecuting the case.

The details contained in the charging documents are allegations. The defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

Member of Violent Gang Sentenced to 10 Years in Prison for Racketeering, Drug and Firearm Offenses

Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

BOSTON – A Boston man was sentenced today in connection with his role in Cameron Street, a violent Boston gang.

Paulo Santos, a/k/a “Bucky,” 35, was sentenced by U.S. Senior District Court Judge William G. Young to 10 years in prison and four years of supervised release. In January 2024, Santos pleaded guilty to conspiracy to participate in a racketeering enterprise (commonly referred to as RICO conspiracy), possession with intent to distribute 500 grams or more of cocaine, and being a felon in possession of a firearm and ammunition. 

According to court documents, Cameron Street is a violent gang based largely in the Dorchester section of Boston that uses violence and threats of violence to preserve, protect and expand its territory, promote a climate of fear and enhance its reputation. Cameron Street members possess, carry and use firearms to murder and assault gang rivals as well as protect narcotics and drug proceeds.

As part of his role in the gang, Santos and another Cameron Street member assaulted and robbed a rival gang member outside the Dorchester District Court on Dec. 6, 2019.  In a video posted on Snapchat later that day, Santos identified the victim as a rival gang member, chased him, and shouted to another Cameron Street member, “Get him!”  On the video, the victim shielded his face while he was punched and kicked repeatedly.  Santos and the other Cameron Street member then robbed the victim of his sneakers and took them as a trophy.  The video included captions that praised Cameron Street and denigrated the victim’s gang.

At the time of Santos’ arrest, approximately 900 grams of cocaine, 500 grams of marijuana, a loaded Smith and Wesson .38 caliber revolver and $15,597 in cash were seized from his stash house in Hingham.

This is Santos’ third firearm conviction. For his last unlawful possession of a firearm conviction, Santos served a four-to-five-year state prison sentence.

This operation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) Strike Force Initiative, which provides for the establishment of permanent multi-agency task force teams that work side-by-side in the same location. This co-located model enables agents from different agencies to collaborate on intelligence-driven, multi-jurisdictional operations to disrupt and dismantle the most significant drug traffickers, money launderers, gangs, and transnational criminal organizations. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

Acting United States Attorney Joshua S. Levy; James M. Ferguson, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms and Explosives, Boston Field Division; Stephen Belleau, Acting Special Agent in Charge of the Drug Enforcement Administration, New England Field Division; and Boston Police Commissioner Michael Cox made the announcement today. Valuable assistance was provided by the Massachusetts State Police; Suffolk County Sheriff’s Office; Suffolk, Plymouth, Norfolk and Bristol County District Attorney’s Offices; and the Canton, Quincy, Randolph, Somerville, Brockton, Malden, Stoughton, Rehoboth and Pawtucket (R.I.) Police Departments. Assistant U.S. Attorneys Christopher Pohl and Charles Dell’Anno of the Criminal Division prosecuted the case.

The details contained in the charging document are allegations. The remaining defendants are presumed to be innocent unless and until proven guilty beyond a reasonable doubt in the court of law.  

Associate of Violent Gang Sentenced to More Than 4 Years in Prison for Drug Conspiracy

Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

BOSTON – An associate of the violent Boston gang Cameron Street was sentenced today in federal court in Boston for drug trafficking.

Michael Lopes, a/k/a “Meech,” 35, of Pawtucket, R.I., was sentenced by U.S. Senior District Court Judge William G. Young to 57 months in prison followed by three years supervised release. In February 2024, Lopes pleaded guilty to a one-count Superseding Information charging him with conspiracy to distribute and possess with intent to distribute cocaine, cocaine base and methamphetamine. 

During a two-year long investigation into Cameron Street, it was determined that Lopes allegedly conspired with his cousin Anthony Centeio – the alleged leader of Cameron Street – and others to distribute cocaine, cocaine base and methamphetamine. Lopes and, allegedly, Centeio made several sales of cocaine and cocaine base to a cooperating witness in Boston, Braintree and Pawtucket, R.I. A search of Lopes’ Rhode Island residence in April 2022 resulted in the recovery of approximately 174 grams of cocaine base, 215 grams of cocaine and 180 grams of methamphetamine, packaging materials and $2,342 in cash.

Acting United States Attorney Joshua S. Levy; James M. Ferguson, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms and Explosives, Boston Field Division; Stephen Belleau, Acting Special Agent in Charge of the Drug Enforcement Administration, New England Field Division; and Boston Police Commissioner Michael Cox made the announcement today. Valuable assistance was provided by the Massachusetts State Police; Suffolk County Sheriff’s Office; Suffolk, Plymouth, Norfolk and Bristol County District Attorney’s Offices; and the Canton, Quincy, Randolph, Somerville, Brockton, Malden, Stoughton, Rehoboth and Pawtucket (R.I.) Police Departments. Assistant U.S. Attorneys Christopher Pohl and Charles Dell’Anno of the Criminal Division prosecuted the case.

This operation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) Strike Force Initiative, which provides for the establishment of permanent multi-agency task force teams that work side-by-side in the same location. This co-located model enables agents from different agencies to collaborate on intelligence-driven, multi-jurisdictional operations to disrupt and dismantle the most significant drug traffickers, money launderers, gangs, and transnational criminal organizations. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

The details contained in the charging document are allegations. The remaining defendants are presumed to be innocent unless and until proven guilty beyond a reasonable doubt in the court of law.  

Boston Man Sentenced to More Than 3 Years in Prison for Unlawful Possession of Ammunition

Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

BOSTON – A Boston man was sentenced today for illegally possessing ammunition as a convicted felon.

Tyreek Hall, 21, was sentenced by U.S. District Court Judge Indira Talwani to 46 months in prison followed by three years of supervised release. In September 2023, Hall pleaded guilty to one count of being a felon in possession of ammunition. 

In or around June 2022, Hall posed on social media with a gun. At the time of the social media post, Hall had been on parole for one week, after early release for a state conviction of assault with a dangerous weapon (a firearm). Hall is prohibited from possessing a firearm or ammunition due to a prior felony conviction. On June 9, 2022, Hall was found in possession of a 9x19mm caliber privately made Glock-style semi-automatic pistol, bearing no manufacturer serial number (commonly known as a “ghost gun”), and eight rounds of ammunition. 

Acting United States Attorney Joshua S. Levy; James Ferguson, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms & Explosives, Boston Field Division; Brian Kyes, U.S. Marshal for the District of Massachusetts; and Boston Police Commissioner Michael Cox made the announcement today. Assistant U.S. Attorneys John Dawley and Fred Wyshak, III of the Organized Crime & Gang Unit prosecuted the case.

This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

#StopRansomware: Black Basta

Source: US Department of Homeland Security

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) (hereafter referred to as the authoring organizations) are releasing this joint CSA to provide information on Black Basta, a ransomware variant whose actors have encrypted and stolen data from at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.

This joint CSA provides TTPs and IOCs obtained from FBI investigations and third-party reporting. Black Basta is considered a ransomware-as-a-service (RaaS) variant and was first identified in April 2022. Black Basta affiliates have impacted a wide range of businesses and critical infrastructure in North America, Europe, and Australia. As of May 2024, Black Basta affiliates have impacted over 500 organizations globally.

Black Basta affiliates use common initial access techniques—such as phishing and exploiting known vulnerabilities—and then employ a double-extortion model, both encrypting systems and exfiltrating data. Ransom notes do not generally include an initial ransom demand or payment instructions. Instead, the notes provide victims with a unique code and instructs them to contact the ransomware group via a .onion URL (reachable through the Tor browser). Typically, the ransom notes give victims between 10 and 12 days to pay the ransom before the ransomware group publishes their data on the Black Basta TOR site, Basta News.

Healthcare organizations are attractive targets for cybercrime actors due to their size, technological dependence, access to personal health information, and unique impacts from patient care disruptions. The authoring organizations urge HPH Sector and all critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from Black Basta and other ransomware attacks. Victims of ransomware should report the incident to their local FBI field office or CISA (see the Reporting section for contact information).

Download the PDF version of this report:

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Initial Access

Black Basta affiliates primarily use spearphishing [T1566] to obtain initial access. According to cybersecurity researchers, affiliates have also used Qakbot during initial access.[1]

Starting in February 2024, Black Basta affiliates began exploiting ConnectWise vulnerability CVE-2024-1709 [CWE-288] [T1190]. In some instances, affiliates have been observed abusing valid credentials [T1078].

Discovery and Execution

Black Basta affiliates use tools such as SoftPerfect network scanner (netscan.exe) to conduct network scanning. Cybersecurity researchers have observed affiliates conducting reconnaissance using utilities with innocuous file names such as Intel or Dell, left in the root drive C: [T1036].[1]

Lateral Movement

Black Basta affiliates use tools such as BITSAdmin and PsExec, along with Remote Desktop Protocol (RDP), for lateral movement. Some affiliates also use tools like Splashtop, Screen Connect, and Cobalt Strike beacons to assist with remote access and lateral movement.

Privilege Escalation and Lateral Movement

Black Basta affiliates use credential scraping tools like Mimikatz for privilege escalation. According to cybersecurity researchers, Black Basta affiliates have also exploited ZeroLogon (CVE-2020-1472, [CWE-330]), NoPac (CVE-2021-42278 [CWE-20] and CVE-2021-42287 [CWE-269]), and PrintNightmare (CVE-2021-34527, [CWE-269]) vulnerabilities for local and Windows Active Domain privilege escalation [T1068].[1],[2]

Exfiltration and Encryption

Black Basta affiliates use RClone to facilitate data exfiltration prior to encryption. Prior to exfiltration, cybersecurity researchers have observed Black Basta affiliates using PowerShell [T1059.001] to disable antivirus products, and in some instances, deploying a tool called Backstab, designed to disable endpoint detection and response (EDR) tooling [T1562.001].[3] Once antivirus programs are terminated, a ChaCha20 algorithm with an RSA-4096 public key fully encrypts files [T1486]. A .basta or otherwise random file extension is added to file names and a ransom note titled readme.txt is left on the compromised system.[4] To further inhibit system recovery, affiliates use the vssadmin.exe program to delete volume shadow copies [T1490].[5]

Leveraged Tools

See Table 1 for publicly available tools and applications used by Black Basta affiliates. This includes legitimate tools repurposed for their operations.

Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

Table 1: Tools Used by Black Basta Affiliates
Tool Name Description
BITSAdmin A command-line utility that manages downloads/uploads between a client and server by using the Background Intelligent Transfer Service (BITS) to perform asynchronous file transfers.
Cobalt Strike A penetration testing tool used by security professions to test the security of networks and systems. Black Basta affiliates have used it to assist with lateral movement and file execution.
Mimikatz A tool that allows users to view and save authentication credentials such as Kerberos tickets. Black Basta affiliates have used it to aid in privilege escalation.
PSExec A tool designed to run programs and execute commands on remote systems.
PowerShell A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.
RClone A command line program used to sync files with cloud storage services such as Mega.
SoftPerfect A network scanner (netscan.exe) used to ping computers, scan ports, discover shared folders, and retrieve information about network devices via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), HTTP, Secure Shell (SSH) and PowerShell. It also scans for remote services, registry, files, and performance counters. 
ScreenConnect Remote support, access, and meeting software that allows users to control devices remotely over the internet.
Splashtop Remote desktop software that allows remote access to devices for support, access, and collaboration.
WinSCP Windows Secure Copy is a free and open source SSH File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Black Basta affiliates have used it to transfer data from a compromised network to actor-controlled accounts.

MITRE ATT&CK TACTICS AND TECHNIQUES

See Tables 2–6 for all referenced threat actor tactics and techniques in this advisory.

Table 2: Black Basta ATT&CK Techniques for Initial Access
Technique Title ID Use
Phishing T1566 Black Basta affiliates have used spearphishing emails to obtain initial access.
Exploit Public-Facing Application T1190 Black Basta affiliates have exploited ConnectWise vulnerability CVE-2024-1709 to obtain initial access.
Table 3: Black Basta ATT&CK Techniques for Privilege Escalation
Technique Title ID Use
Exploitation for Privilege Escalation T1068 Black Basta affiliates have used credential scraping tools like Mimikatz, Zerologon, NoPac and PrintNightmare for privilege escalation.
Table 4: Black Basta ATT&CK Techniques for Defense Evasion
Technique Title ID Use
Masquerading T1036 Black Basta affiliates have conducted reconnaissance using utilities with innocuous file names, such as Intel or Dell, to evade detection.
Impair Defenses: Disable or Modify Tools T1562.001

Black Basta affiliates have deployed a tool called Backstab to disable endpoint detection and response (EDR) tooling.

Black Basta affiliates have used PowerShell to disable antivirus products.

Table 5: Black Basta ATT&CK Techniques for Execution
Technique Title ID Use
Command and Scripting Interpreter: PowerShell T1059.001 Black Basta affiliates have used PowerShell to disable antivirus products.
Table 6: Black Basta ATT&CK Techniques for Impact
Technique Title ID Use
Inhibit System Recovery T1490 Black Basta affiliates have used the vssadmin.exe program to delete shadow copies. 
Data Encrypted for Impact T1486 Black Basta affiliates have used a public key to fully encrypt files. 

INDICATORS OF COMPROMISE

See Table 7 for IOCs obtained from FBI investigations.

Table 7: Malicious Files Associated with Black Basta Ransomware
Hash Description
0112e3b20872760dda5f658f6b546c85f126e803e27f0577b294f335ffa5a298 rclone.exe
d3683beca3a40574e5fd68d30451137e4a8bbaca8c428ebb781d565d6a70385e Winscp.exe
88c8b472108e0d79d16a1634499c1b45048a10a38ee799054414613cc9dccccc DLL
58ddbea084ce18cfb3439219ebcf2fc5c1605d2f6271610b1c7af77b8d0484bd DLL
39939eacfbc20a2607064994497e3e886c90cd97b25926478434f46c95bd8ead DLL
5b2178c7a0fd69ab00cef041f446e04098bbb397946eda3f6755f9d94d53c221 DLL
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e DLL
d15bfbc181aac8ce9faa05c2063ef4695c09b718596f43edc81ca02ef03110d1 DLL
5942143614d8ed34567ea472c2b819777edd25c00b3e1b13b1ae98d7f9e28d43 DLL
05ebae760340fe44362ab7c8f70b2d89d6c9ba9b9ee8a9f747b2f19d326c3431 DLL
a7b36482ba5bca7a143a795074c432ed627d6afa5bc64de97fa660faa852f1a6 DLL
86a4dd6be867846b251460d2a0874e6413589878d27f2c4482b54cec134cc737 DLL
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799 DLL
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be ELF
1c1b2d7f790750d60a14bd661dae5c5565f00c6ca7d03d062adcecda807e1779 ELF
360c9c8f0a62010d455f35588ef27817ad35c715a5f291e43449ce6cb1986b98 ELF
0554eb2ffa3582b000d558b6950ec60e876f1259c41acff2eac47ab78a53e94a EXE
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc EXE
62e63388953bb30669b403867a3ac2c8130332cf78133f7fd4a7f23cdc939087 EXE
7ad4324ea241782ea859af12094f89f9a182236542627e95b6416c8fb9757c59 EXE
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd EXE
90ba27750a04d1308115fa6a90f36503398a8f528c974c5adc07ae8a6cd630e7 EXE
fafaff3d665b26b5c057e64b4238980589deb0dff0501497ac50be1bc91b3e08 EXE
acb60f0dd19a9a26aaaefd3326db8c28f546b6b0182ed2dcc23170bcb0af6d8f EXE
d73f6e240766ddd6c3c16eff8db50794ab8ab95c6a616d4ab2bc96780f13464d EXE
f039eaaced72618eaba699d2985f9e10d252ac5fe85d609c217b45bc8c3614f4 EXE
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224 EXE
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e EXE
fff35c2da67eef6f1a10c585b427ac32e7f06f4e4460542207abcd62264e435f EXE
df5b004be71717362e6b1ad22072f9ee4113b95b5d78c496a90857977a9fb415 EXE
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7 EXE
3c50f6369f0938f42d47db29a1f398e754acb2a8d96fd4b366246ac2ccbe250a EXE
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa EXE
37a5cd265f7f555f2fe320a68d70553b7aa9601981212921d1ac2c114e662004 EXE
3090a37e591554d7406107df87b3dc21bda059df0bc66244e8abef6a5678af35 EXE
17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20 EXE
42f05f5d4a2617b7ae0bc601dd6c053bf974f9a337a8fcc51f9338b108811b78 EXE
882019d1024778e13841db975d5e60aaae1482fcf86ba669e819a68ce980d7d3 EXE
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757 EXE
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e EXE
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944 EXE
3337a7a9ccdd06acdd6e3cf4af40d871172d0a0e96fc48787b574ac93689622a EXE
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90 EXE
b32daf27aa392d26bdf5faafbaae6b21cd6c918d461ff59f548a73d447a96dd9 EXE

See Tables 8–11 for IOCs obtained from trusted third-party reporting.

Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains.

Table 8: Network Indicators
IP Address Description
66.249.66[.]18 0gpw.588027fa.dns.realbumblebee[.]net, dns.trailshop[.]net, dns.artspathgroupe[.]net
66.249.66[.]18 my.2a91c002002.588027fa.dns.realbumblebee[.]net
66.249.66[.]18 fy9.39d9030e5d3a8e2352daae2f4cd3c417b36f64c6644a783b9629147a1.afd8b8a4615358e0313bad8c544a1af0d8efcec0e8056c2c8eee96c7.b06d1825c0247387e38851b06be0272b0bd619b7c9636bc17b09aa70.a46890f27.588027fa.dns.realbumblebee[.]net
95.181.173[.]227 adslsdfdsfmo[.]world
  fy9.36c44903529fa273afff3c9b7ef323432e223d22ae1d625c4a3957d57.015c16eff32356bf566c4fd3590c6ff9b2f6e8c587444ecbfc4bcae7.f71995aff9e6f22f8daffe9d2ad9050abc928b8f93bb0d42682fd3c3.445de2118.588027fa.dns.realbumblebee[.]net
207.126.152[.]242 xkpal.d6597fa.dns.blocktoday.net
nuher.3577125d2a75f6a277fc5714ff536c5c6af5283d928a66daad6825b9a.7aaf8bba88534e88ec89251c57b01b322c7f52c7f1a5338930ae2a50.cbb47411f60fe58f76cf79d300c03bdecfb9e83379f59d80b8494951.e10c20f77.7fcc0eb6.dns.blocktoday[.]net
72.14.196[.]50 .rasapool[.]net, dns.trailshop[.]net
72.14.196[.]192 .rasapool[.]net
72.14.196[.]2 .rasapool[.]net
72.14.196[.]226 .rasapool[.]net
46.161.27[.]151  
207.126.152[.]242 nuher.1d67bbcf4.456d87aa6.2d84dfba.dns.specialdrills[.]com
185.219.221[.]136  
64.176.219[.]106  
5.78.115[.]67 your-server[.]de
207.126.152[.]242 xkpal.1a4a64b6.dns.blocktoday[.]net
46.8.16[.]77  
185.7.214[.]79 VPN Server
185.220.100[.]240 Tor exit
107.189.30[.]69 Tor exit
5.183.130[.]92  
185.220.101[.]149 Tor exit
188.130.218[.]39  
188.130.137[.]181  
46.8.10[.]134  
155.138.246[.]122  
80.239.207[.]200 winklen[.]ch
183.181.86[.]147 Xserver[.]jp
34.149.120[.]3  
104.21.40[.]72  
34.250.161[.]149  
88.198.198[.]90 your-server[.]de; literoved[.]ru
151.101.130[.]159  
35.244.153[.]44  
35.212.86[.]55  
34.251.163[.]236  
34.160.81[.]203  
34.149.36[.]179  
104.21.26[.]145  
83.243.40[.]10  
35.227.194[.]51  
35.190.31[.]54  
34.120.190[.]48  
116.203.186[.]178  
34.160.17[.]71  
Table 9: File Indicators
Filename Hash
C:UsersPublicAudioJun.exe b6a4f4097367d9c124f51154d8750ea036a812d5badde0baf9c5f183bb53dd24
C:UsersPublicAudioesx.zip  
C:UsersPublicAudio7zG.exe f21240e0bf9f0a391d514e34d4fa24ecb997d939379d2260ebce7c693e55f061
C:UsersPublicAudio7z.dll  
C:UsersPublicdb_Usr.sql 8501e14ee6ee142122746333b936c9ab0fc541328f37b5612b6804e6cdc2c2c6
C:UsersPublicAudiodb_Usr.sql  
C:UsersPublicAudiohv2.ps1  
C:UsersPublic7zG.exe  
C:UsersPublic7z.dll  
C:UsersPublicBitLogic.dll  
C:UsersPublicNetApp.exe 4c897334e6391e7a2fa3cbcbf773d5a4
C:UsersPublicDataSoft.exe 2642ec377c0cee3235571832cb472870
C:UsersPublicBitData.exe b3fe23dd4701ed00d79c03043b0b952e
C:UsersPublicDigitalText.dll  
C:UsersPublicGeniusMesh.exe  
DeviceMup{redacted}C$UsersPublicMusicPROCEXP.sys  
DeviceMup{redacted}C$UsersPublicMusicDumpNParse86.exe  
DeviceMup{redacted}C$UsersPublicMusicPOSTDump.exe  
DeviceMup{redacted}C$UsersPublicMusicDumpNParse.exe  
C:UsersPublicsocksps.ps1  
C:UsersPublicThief.exe 034b5fe047920b2ae9493451623633b14a85176f5eea0c7aadc110ea1730ee79

C:UsersAll Users{redacted}GWT.ps1

C:Program FilesMonitorITGWT.ps1

8C68B2A794BA3D148CAE91BDF9C8D357289752A94118B5558418A36D95A5A45F

Winx86.exe 

Comment: alias for cmd.exe

 
C:UsersPubliceucr.exe 3c65da7f7bfdaf9acc6445abbedd9c4e927d37bb9e3629f34afc338058680407
C:WindowsDS_c1.dll 808c96cb90b7de7792a827c6946ff48123802959635a23bf9d98478ae6a259f9
C:WindowsDS_c1.dll 3a8fc07cadc08eeb8be342452636a754158403c3d4ebff379a4ae66f8298d9a6
C:WindowsDS_c1.dll 4ac69411ed124da06ad66ee8bfbcea2f593b5b199a2c38496e1ee24f9d04f34a
C:WindowsDS_c1.dll 819cb9bcf62be7666db5666a693524070b0df589c58309b067191b30480b0c3a
C:WindowsDS_c1.dll c26a5cb62a78c467cc6b6867c7093fbb7b1a96d92121d4d6c3f0557ef9c881e0
C:WindowsDS_c1.dll d503090431fdd99c9df3451d9b73c5737c79eda6eb80c148b8dc71e84623401f
*instructions_read_me.txt  
Table 10: Known Black Basta Cobalt Strike Domains
Domain Date/Time (UTC)/Time (UTC)
trailshop[.]net 5/8/2024 6:37
realbumblebee[.]net 5/8/2024 6:37
recentbee[.]net 5/8/2024 6:37
investrealtydom[.]net 5/8/2024 6:37
webnubee[.]com 5/8/2024 6:37
artspathgroup[.]net 5/8/2024 6:37
buyblocknow[.]com 5/8/2024 6:37
currentbee[.]net 5/8/2024 6:37
modernbeem[.]net 5/8/2024 6:37
startupbusiness24[.]net 5/8/2024 6:37
magentoengineers[.]com 5/8/2024 6:37
childrensdolls[.]com 5/8/2024 6:37
myfinancialexperts[.]com 5/8/2024 6:37
limitedtoday[.]com 5/8/2024 6:37
kekeoamigo[.]com 5/8/2024 6:37
nebraska-lawyers[.]com 5/8/2024 6:37
tomlawcenter[.]com 5/8/2024 6:37
thesmartcloudusa[.]com 5/8/2024 6:37
rasapool[.]net 5/8/2024 6:37
artspathgroupe[.]net 5/8/2024 6:37
specialdrills[.]com 5/8/2024 6:37
thetrailbig[.]net 5/8/2024 6:37
consulheartinc[.]com 3/22/2024 15:35
otxcosmeticscare[.]com 3/15/2024 10:14
otxcarecosmetics[.]com 3/15/2024 10:14
artstrailman[.]com 3/15/2024 10:14
ontexcare[.]com 3/15/2024 10:14
trackgroup[.]net 3/15/2024 10:14
businessprofessionalllc[.]com 3/15/2024 10:14
securecloudmanage[.]com 3/7/2024 10:42
oneblackwood[.]com 3/7/2024 10:42
buygreenstudio[.]com 3/7/2024 10:42
startupbuss[.]com 3/7/2024 10:42
onedogsclub[.]com 3/4/2024 18:26
wipresolutions[.]com 3/4/2024 18:26
recentbeelive[.]com 3/4/2024 18:26
trailcocompany[.]com 3/4/2024 18:26
trailcosolutions[.]com 3/4/2024 18:26
artstrailreviews[.]com 3/4/2024 18:26
usaglobalnews[.]com 2/15/2024 5:56
topglobaltv[.]com 2/15/2024 5:56
startupmartec[.]net 2/15/2024 5:56
technologgies[.]com 1/2/2024 18:16
jenshol[.]com 1/2/2024 18:16
simorten[.]com 1/2/2024 18:16
investmentgblog[.]net 1/2/2024 18:16
protectionek[.]com 1/2/2024 18:16
Table 11: Suspected Black Basta Domains
airbusco[.]net
allcompanycenter[.]com
animalsfast[.]net
audsystemecll[.]net
auuditoe[.]com
bluenetworking[.]net
brendonline[.]com
businesforhome[.]com
caspercan[.]com
clearsystemwo[.]net
cloudworldst[.]net
constrtionfirst[.]com
erihudeg[.]com
garbagemoval[.]com
gartenlofti[.]com
getfnewsolutions[.]com
getfnewssolutions[.]com
investmendvisor[.]net
investmentrealtyhp[.]net
ionoslaba[.]com
jessvisser[.]com
karmafisker[.]com
kolinileas[.]com
maluisepaul[.]com
masterunix[.]net
monitor-websystem[.]net
monitorsystem[.]net
mytrailinvest[.]net
prettyanimals[.]net
reelsysmoona[.]net
seohomee[.]com
septcntr[.]com
softradar[.]net
startupbizaud[.]net
startuptechnologyw[.]net
steamteamdev[.]net
stockinvestlab[.]net
taskthebox[.]net
trailgroupl[.]net
treeauwin[.]net
unitedfrom[.]com
unougn[.]com
wardeli[.]com
welausystem[.]net
wellsystemte[.]net
withclier[.]com

MITIGATIONS

The authoring organizations recommend all critical infrastructure organizations implement the mitigations below to improve your organization’s cybersecurity posture based on Black Basta’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

The authoring organizations also recommend network defenders of HPH Sector and other critical infrastructure organizations to reference CISA’s Mitigation Guide: Healthcare and Public Health (HPH) Sector and HHS’s HPH Cybersecurity Performance Goals, which provide best practices to combat pervasive cyber threats against organizations. Recommendations include the following:

  • Asset Management and Security: Cybersecurity professionals should identify and understand all relationships or interdependencies, functionality of each asset, what it exposes, and what software is running to ensure critical data and systems are protected appropriately. HPH Sector organizations should ensure electronic PHI (ePHI) is protected and compliant with the Health Insurance Portability and Accountability Act (HIPAA). Organizations can complete asset inventories using active scans, passive processes, or a combination of both techniques.
  • Email Security and Phishing Prevention: Organizations should install modern anti-malware software and automatically update signatures where possible. For additional guidance, see CISA’s Enhance Email and Web Security Guide.
    • Check for embedded or spoofed hyperlinks: Validate the URL of the link matches the text of the link itself. This can be achieved by hovering your cursor over the link to view the URL of the website to be accessed.
  • Access Management: Phishing-resistant MFA completes the same process but removes ‘people’ from the equation to help thwart social engineering scams and targeted phishing attacks that may have been successful using traditional MFA. The two main forms of phishing-resistant MFA are FIDO/Web Authentication (WebAuthn) authentication and Public Key Infrastructure (PKI)-based authentication. Prioritize phishing-resistant MFA on accounts with the highest risk, such as privileged administrative accounts on key assets. For additional information on phishing-resistant MFA, see CISA’s Implementing Phishing-Resistant MFA Guide.
  • Vulnerability Management and Assessment: Once vulnerabilities are identified across your environment, evaluate and prioritize to appropriately deal with the posed risks according to your organization’s risk strategy. To assist with prioritization, it is essential to:
    • Map your assets to business-critical functions. For vulnerability remediation, prioritize assets that are most critical for ongoing operations or which, if affected, could impact your organization’s business continuity, sensitive PII (or PHI) security, reputation, or financial position.
    • Use threat intelligence information. For remediation, prioritize vulnerabilities actively exploited by threat actors. To assist, leverage CISA’s KEV Catalog and other threat intelligence feeds.
    • Leverage prioritization methodologies, ratings, and scores. The Common Vulnerability Scoring System (CVSS) assesses the technical severity of vulnerabilities. The Exploit Prediction Scoring System (EPSS) measures the likelihood of exploitation and can help with deciding which vulnerabilities to prioritize. CISA’s Stakeholder-Specific Vulnerability Categorization (SSVC) methodology leverages decision trees to prioritize relevant vulnerabilities into four decisions, Track, Track*, Attend, and Act based on exploitation status, technical impact, mission prevalence, and impacts to safety and public-wellbeing.

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Tables 2-6).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

REFERENCES

  1. SentinelOne: Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
  2. Trend Micro: Ransomware Spotlight – Black Basta
  3. Kroll: Black Basta – Technical Analysis
  4. Who Is Black Basta? (blackberry.com)
  5. Palo Alto Networks: Threat Assessment – Black Basta Ransomware

REPORTING

Your organization has no obligation to respond or provide information back to FBI in response to this joint CSA. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

Additional details of interest include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

FBI, CISA, and HHS do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov or by calling 1-844-Say-CISA [1-844-729-2472]).

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. FBI, CISA, HHS, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, HHS, and MS-ISAC.

VERSION HISTORY

May 10, 2024: Initial version.

Former Columbus Vice Detective Sentenced to 11 Years in Prison for Depriving Victims’ Civil Rights, Obstructing Justice

Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

COLUMBUS, Ohio – A former Columbus vice detective was sentenced in federal court today to 132 months in prison for crimes related to kidnapping victims under the guise of an arrest.

Andrew K. Mitchell, 60, of Sunbury, pleaded guilty in December 2023 to two counts of depriving individuals of their civil rights while acting under color of law and one count of obstructing justice.

Mitchell was employed by the Columbus Division of Police from 1988 until 2019 and was assigned to the vice unit from 2017 until 2019. As part of his duties in that role, Mitchell conducted law enforcement actions for solicitation offenses.

“As a member of the vice unit and a long-serving police officer, Mitchell was well aware of the special vulnerabilities of the sex workers and often drug addicted females with which he came into contact,” said U.S. Attorney Kenneth L. Parker. “Instead of helping them seek refuge, Mitchell was the type of predator who purposely targeted these women. The U.S. Attorney’s Office is dedicated to upholding the community’s work to connect victimized women to services and to prosecuting those who prey on vulnerable victims, no matter who they are.”

According to court documents, in July 2017, Mitchell picked up a sex worker who was working in the Hilltop near Sullivant and Whitethorne avenues. Mitchell was in plain clothes and an unmarked black sedan. He told the victim he was a police officer and acted as if he were doing a check for any outstanding warrants on the victim.

Mitchell used this ruse to handcuff the victim to the doorknob of his vehicle. He drove the victim to a nearby parking lot with multiple dumpsters and forcible held and detained the victim against her will before dropping her off at her boyfriend’s residence.

Similarly, in September 2017, Mitchell picked up a second sex worker in the Hilltop. Mitchell was again in plain clothes and was driving a dark SUV. He began discussing the victim’s rates for sexual activity before announcing that he was an officer with the vice unit and said she was going to jail.

Mitchell kidnapped the victim and drove her to Lindbergh Park, holding her against her will.

Mitchell was also sentenced today for obstructing justice. Specifically, during the federal investigation into Mitchell’s civil rights crimes, he directed several individuals to assist him in cleaning out one of the rental properties he owned, located on Denune Ave. The individuals disposed of evidence including photos, clothing, bedding and rental records, and used bleach extensively in the apartment to clean a bed, couch, ottoman and floor.

Mitchell was charged federally and arrested in March 2019.

Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; Ohio Attorney General Dave Yost; Ohio Auditor of State Keith Faber and Columbus Police Chief Elaine Bryant announced the sentence imposed today by U.S. District Judge Edmund A. Sargus, Jr. Assistant United States Attorneys Kevin W. Kelley and Noah R. Litton are representing the United States in this case.

# # #

Longtime Treasurer Pleads Guilty to Stealing Nearly $1 Million in Campaign Funds

Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

COLUMBUS, Ohio – A Columbus man who served as a campaign treasurer for more than 100 candidates since the 1980s pleaded guilty in federal court to wire fraud related to stealing nearly $1 million in campaign funds.

William Curlis, 76, was charged by a bill of information in April 2024. He pleaded guilty today to one count of wire fraud.

According to the court documents, from 2008 until June 2023, Curlis defrauded candidates of approximately $995,231 of campaign funds.

As part of his plea, Curlis admitted that he wrote checks from the bank accounts of certain candidates and one PAC to himself for personal use. The defendant transferred funds between campaign accounts without candidates’ knowledge to conceal the deficit he created.

For example, from 2000 to 2023, Curlis was the primary signatory on at least 111 bank accounts, and of those, he was the only signatory on 108 accounts.

Curlis wrote at least 179 checks to himself from campaign accounts belonging to 18 different candidates and one PAC.

Curlis sold his home in 2016 to cover the cost of campaign expenses, including campaign media costs and account balances, to prevent the discovery of his theft.

Wire fraud is a federal crime punishable by up to 20 years in prison. As part of his plea, Curlis will pay $995,231 in restitution.

U.S. Attorney Kenneth L. Parker, FBI Special Agent in Charge Elena Iatarola, Ohio Secretary of State Frank LaRose and Ohio Attorney General Dave Yost announced the guilty plea offered on May 8 before U.S. Magistrate Judge Norah McCann King.

This case was investigated by the FBI’s Southern Ohio Public Corruption Task Force, which includes agents and officers from the Ohio Bureau of Criminal Investigations (BCI), Columbus Division of Police and Ohio Auditor’s Office. The Ohio Secretary of State’s office was also an integral part of the investigation.

Deputy Criminal Chief Jessica W. Knight is representing the United States in this case.

# # #