It is commonplace for legislation enforcement companies to supply substantial rewards for data which could result in the identification, arrest, and conviction of cybercriminals.
As an example, we now have seen a US $10 million reward for suspected LockBit ransomware mastermind Dmitry Yuryevich Khoroshev, a $2.5 million bounty supplied for the arrest of a key individual suspected of involvement with the Angler Exploit Equipment, and a $10 million reward supplied for details about the Russian navy hackers implicated within the NotPetya assault, amongst many different examples.
So it most likely did not appear so unusual that an array of cybersecurity information retailers introduced final week that Europol was providing a reward of as much as $50,000 for details about two senior members of the Qilin ransomware gang.

Sadly, it wasn’t true.
As Bleeping Pc reviews, a brand new Telegram channel known as @europolcti was created earlier this month and that’s the place the pretend information of the $50,000 reward was posted slightly than on Europol’s web site, or official social media accounts.
The textual content of the pretend reward supply learn partially:
Throughout the course of ongoing worldwide investigations, we now have confirmed that the cybercriminal group Qilin has carried out ransomware assaults worldwide, severely disrupting vital infrastructure and inflicting vital monetary losses.
The message continued by claiming that Europol had recognized that Qilin gang’s major directors, who oversaw extortions and co-ordinated associates, used the net aliases “Haise” and “XORacle”.
A reward of as much as $50,000 is obtainable for data that immediately results in the identification or location of those directors.
Now, that actually can be information price writing about if it have been true (though, if I may be churlish, I view the dimensions of the reward as not likely being in the identical league as different bounties supplied up to now), nevertheless it has been confirmed as nonsense by Europol itself.
As with a lot of social media, it is simple for anybody to create an account claiming to be whoever they like. And if any posts they make occur to generate some traction, it could actually quickly be the case that the information is multiplying and spreading uncontrolled all over the world.
So, why precisely did somebody publish information of a pretend bounty for data resulting in members of the Qilin ransomware gang?
Nicely, a potential clarification could be present in a subsequent publish on the channel from somebody calling themselves “Rey”:
This was really easy o run and idiot so known as ‘Researchers’ and ‘Journalists’ that simply copy stuff.. Thanks all!
Europol’s Qilin ransomware bounty could also be nonsense. However the ransomware itself is a severe menace, and no laughing matter. Earlier this yr an official investigation linked an assault by Qilin towards a UK NHS supplier as being one of many components that prompted a affected person’s demise.
