December 2, 2024 By Jonathan Reed 3 min read

The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place?

As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.

Takedowns and their ripple effects

USDoD, also known as EquationCorp, was apprehended in Brazil following years of high-profile hacks, including the FBI’s InfraGard portal. But his arrest isn’t an isolated case. In recent years, international task forces have relentlessly pursued major cyber crime rings with mixed results.

Consider the 2021 takedown of the Clop ransomware group, whose members were arrested in Ukraine after causing an estimated $500 million in damages. Despite the high-profile arrests, the Clop gang returned with renewed vigor, exploiting new vulnerabilities like the GoAnywhere zero-day​.

This pattern of cyber crime’s persistence, regardless of major arrests, was also seen with Emotet, the infamous malware network. After law enforcement agencies across multiple countries dismantled Emotet’s infrastructure in 2021, it seemed like a triumph. Yet, despite the immediate disruption, Emotet has since evolved, and cyber criminals have found new ways to exploit the same techniques​.

What makes USDoD different?

While takedowns are increasingly common, USDoD’s case stands apart for both its scale and the attacker’s audacity. Not only did the National Public Data breach expose personal data from 2.9 billion U.S. citizens — one of the largest data breaches in history — but USDoD also flaunted his actions. After being doxed by CrowdStrike, USDoD openly confirmed his identity, a bold move that eventually aided Brazilian authorities in his capture.

This arrest strikes at the heart of the threat actor’s operational security — a weak point many seasoned cyber criminals avoid exposing. USDoD’s combination of arrogance and scale sets him apart from other attackers, who typically work diligently to avoid being identified, let alone publicly confirming their identities.

Read the Cost of a Data Breach Report

Broader landscape of arrests and their limits

USDoD’s capture is a significant win, but cyber crime remains deeply resilient. For example, when the Lapsus$ hacker group was targeted in 2023, a series of arrests followed. Notably, 18-year-old Arion Kurtaj, a member of the group, was convicted in connection with attacks on Uber, Microsoft and Rockstar Games. Despite the disbanding of some Lapsus$ members, other cyber gangs didn’t seem to notice as attacks continued at high rates.

Similarly, the takedown of Hive ransomware in 2023, which involved the seizure of servers and the provision of decryption keys to victims, was a triumph for law enforcement. However, as seen with Clop and other ransomware groups, these efforts often do little to curb the broader trend of organized cyber crime​.

Are arrests a deterrent?

Despite the attention-grabbing nature of arrests like that of USDoD, the overall effect on cyber crime remains uncertain. While high-profile takedowns send a clear message that law enforcement is capable of reaching even the most elusive criminals, they do little to halt the broader, decentralized nature of cyber crime. Criminal groups have demonstrated a remarkable ability to adapt and reemerge, often learning from the mistakes of their captured peers.

One notable trend in 2024 has been the rise of unaffiliated ransomware actors. Coveware reported a significant increase in attacks by unaffiliated actors, often referred to as “lone wolves.” These attackers operate independently of established ransomware brands like LockBit or BlackCat. And their stealth may make them more difficult to apprehend.

The fight goes on

USDoD’s arrest is a testament to the global reach and determination of law enforcement. However, as with past takedowns of major cyber criminal groups, it serves as a reminder that the fight against cyber crime is far from over.

While these victories disrupt operations and bring justice to individual criminals, they are not a panacea for a problem that continues to evolve and expand. Organizations must remain vigilant, as the arrest of one threat actor will not prevent the rise of others eager to exploit new opportunities.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today