class Akismet_REST_API { /** * Register the REST API routes. */ public static function init() { if ( ! function_exists( 'register_rest_route' ) ) { // The REST API wasn't integrated into core until 4.4, and we support 4.0+ (for now). return false; } register_rest_route( 'akismet/v1', '/key', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_key' ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_key' ), 'args' => array( 'key' => array( 'required' => true, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::DELETABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'delete_key' ), ) ) ); register_rest_route( 'akismet/v1', '/settings/', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_settings' ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_boolean_settings' ), 'args' => array( 'akismet_strictness' => array( 'required' => false, 'type' => 'boolean', 'description' => __( 'If true, Akismet will automatically discard the worst spam automatically rather than putting it in the spam folder.', 'akismet' ), ), 'akismet_show_user_comments_approved' => array( 'required' => false, 'type' => 'boolean', 'description' => __( 'If true, show the number of approved comments beside each comment author in the comments list page.', 'akismet' ), ), ), ) ) ); register_rest_route( 'akismet/v1', '/stats', array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_stats' ), 'args' => array( 'interval' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_interval' ), 'description' => __( 'The time period for which to retrieve stats. Options: 60-days, 6-months, all', 'akismet' ), 'default' => 'all', ), ), ) ); register_rest_route( 'akismet/v1', '/stats/(?P[\w+])', array( 'args' => array( 'interval' => array( 'description' => __( 'The time period for which to retrieve stats. Options: 60-days, 6-months, all', 'akismet' ), 'type' => 'string', ), ), array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_stats' ), ) ) ); register_rest_route( 'akismet/v1', '/alert', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::DELETABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'delete_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ) ) ); } /** * Get the current Akismet API key. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_key( $request = null ) { return rest_ensure_response( Akismet::get_api_key() ); } /** * Set the API key, if possible. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_key( $request ) { if ( defined( 'WPCOM_API_KEY' ) ) { return rest_ensure_response( new WP_Error( 'hardcoded_key', __( 'This site\'s API key is hardcoded and cannot be changed via the API.', 'akismet' ), array( 'status'=> 409 ) ) ); } $new_api_key = $request->get_param( 'key' ); if ( ! self::key_is_valid( $new_api_key ) ) { return rest_ensure_response( new WP_Error( 'invalid_key', __( 'The value provided is not a valid and registered API key.', 'akismet' ), array( 'status' => 400 ) ) ); } update_option( 'wordpress_api_key', $new_api_key ); return self::get_key(); } /** * Unset the API key, if possible. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function delete_key( $request ) { if ( defined( 'WPCOM_API_KEY' ) ) { return rest_ensure_response( new WP_Error( 'hardcoded_key', __( 'This site\'s API key is hardcoded and cannot be deleted.', 'akismet' ), array( 'status'=> 409 ) ) ); } delete_option( 'wordpress_api_key' ); return rest_ensure_response( true ); } /** * Get the Akismet settings. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_settings( $request = null ) { return rest_ensure_response( array( 'akismet_strictness' => ( get_option( 'akismet_strictness', '1' ) === '1' ), 'akismet_show_user_comments_approved' => ( get_option( 'akismet_show_user_comments_approved', '1' ) === '1' ), ) ); } /** * Update the Akismet settings. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_boolean_settings( $request ) { foreach ( array( 'akismet_strictness', 'akismet_show_user_comments_approved', ) as $setting_key ) { $setting_value = $request->get_param( $setting_key ); if ( is_null( $setting_value ) ) { // This setting was not specified. continue; } // From 4.7+, WP core will ensure that these are always boolean // values because they are registered with 'type' => 'boolean', // but we need to do this ourselves for prior versions. $setting_value = Akismet_REST_API::parse_boolean( $setting_value ); update_option( $setting_key, $setting_value ? '1' : '0' ); } return self::get_settings(); } /** * Parse a numeric or string boolean value into a boolean. * * @param mixed $value The value to convert into a boolean. * @return bool The converted value. */ public static function parse_boolean( $value ) { switch ( $value ) { case true: case 'true': case '1': case 1: return true; case false: case 'false': case '0': case 0: return false; default: return (bool) $value; } } /** * Get the Akismet stats for a given time period. * * Possible `interval` values: * - all * - 60-days * - 6-months * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_stats( $request ) { $api_key = Akismet::get_api_key(); $interval = $request->get_param( 'interval' ); $stat_totals = array(); $response = Akismet::http_post( Akismet::build_query( array( 'blog' => get_option( 'home' ), 'key' => $api_key, 'from' => $interval ) ), 'get-stats' ); if ( ! empty( $response[1] ) ) { $stat_totals[$interval] = json_decode( $response[1] ); } return rest_ensure_response( $stat_totals ); } /** * Get the current alert code and message. Alert codes are used to notify the site owner * if there's a problem, like a connection issue between their site and the Akismet API, * invalid requests being sent, etc. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_alert( $request ) { return rest_ensure_response( array( 'code' => get_option( 'akismet_alert_code' ), 'message' => get_option( 'akismet_alert_msg' ), ) ); } /** * Update the current alert code and message by triggering a call to the Akismet server. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_alert( $request ) { delete_option( 'akismet_alert_code' ); delete_option( 'akismet_alert_msg' ); // Make a request so the most recent alert code and message are retrieved. Akismet::verify_key( Akismet::get_api_key() ); return self::get_alert( $request ); } /** * Clear the current alert code and message. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function delete_alert( $request ) { delete_option( 'akismet_alert_code' ); delete_option( 'akismet_alert_msg' ); return self::get_alert( $request ); } private static function key_is_valid( $key ) { $response = Akismet::http_post( Akismet::build_query( array( 'key' => $key, 'blog' => get_option( 'home' ) ) ), 'verify-key' ); if ( $response[1] == 'valid' ) { return true; } return false; } public static function privileged_permission_callback() { return current_user_can( 'manage_options' ); } /** * For calls that Akismet.com makes to the site to clear outdated alert codes, use the API key for authorization. */ public static function remote_call_permission_callback( $request ) { $local_key = Akismet::get_api_key(); return $local_key && ( strtolower( $request->get_param( 'key' ) ) === strtolower( $local_key ) ); } public static function sanitize_interval( $interval, $request, $param ) { $interval = trim( $interval ); $valid_intervals = array( '60-days', '6-months', 'all', ); if ( ! in_array( $interval, $valid_intervals ) ) { $interval = 'all'; } return $interval; } public static function sanitize_key( $key, $request, $param ) { return trim( $key ); } } The Tverskoy Court named the names of the REvil hackers who were detained by the FSB "at the request of the United States" - Novichok (Moscow) Times
Sunday, December 14, 2025
  • Login
No Result
View All Result
NEWSLETTER
Novichok (Moscow) Times
Social icon element need JNews Essential plugin to be activated.
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY
No Result
View All Result
Novichok (Moscow) Times

The Tverskoy Court named the names of the REvil hackers who were detained by the FSB “at the request of the United States”

by novichoktimes
January 14, 2022
in THE INSIDER
0
The Tverskoy Court named the names of the REvil hackers who were detained by the FSB “at the request of the United States”

[ad_1]

The names of the members of the REvil hacker group, who were detained by the FSB “at the request of the United States,” have become known. According to the Tverskoy court, Roman Muromsky and Andrey Bessonov were detained. About it informs RBC. It is also known that Muromsky is suspected under Part 2 of Art. 187 of the Criminal Code (illegal circulation of means of payment). He faces up to 7 years in prison.

Previously reportedthat the operation was carried out after the appeal of the US authorities, who reported the leader of the community and his involvement in attacks on Western Internet companies. According to the FSB, the full composition of REvil and the involvement of its members in the illegal circulation of means of payment have been established, and the detained members of the group have been charged under article 187 of the Russian Criminal Code.

It is also noted that over 426 million rubles were seized at 25 addresses, including in cryptocurrency, 600 thousand dollars, 500 thousand euros, computer equipment, crypto wallets and 20 premium cars bought with criminal money.

According to media reports, REvil members with Russian citizenship will not be extradited to the United States.

Formerly CNN informedthat the US authorities are planning to bring charges against Ukrainian citizen Yaroslav Vasinsky and Russian citizen Yevgeny Polyanin. According to American investigators, they were part of the REvil group and were involved in cybercrimes. As part of the investigation, law enforcement agencies seized $6 million sent to Polyanin as a ransom.

Vasinsky and Polyanin are accused of extortion, fraud and money laundering. Vasinsky, 22, was arrested in October 2021 in Poland. He faces extradition to the US. Polyanin, 28, remains at large. According to the FBI, he is in Barnaul. Both of them were included in the list of persons against whom sanctions were imposed.

Vasinsky, according to investigators, distributed the REvil virus. Using this program, hackers encrypted data on an infected computer, and then extorted money for help in decrypting it. The damage caused by REvil to American companies exceeds $200 million.

On July 4, US Independence Day, hackers staged a cyberattack on Florida-based software company Kaseya. Thanks to this, they were able to infect the computers of more than 1,500 companies around the world that were Kaseya’s customers with the virus.

It was also reported that earlier this year, the group demanded $50 million from Apple after hacking into the computer systems of one of the technology giant’s suppliers.

In addition, the FBI suspected members of REvil in the May attack on JBS, which occupies a fifth of the American beef market. Due to a cyber attack, JBS was forced to temporarily stop production at factories in Australia, Canada and the United States. The company paid hackers $11 million to unlock its computer systems.

After the July cyberattack, REvil’s websites stopped functioning. The media noted that this happened shortly after a telephone conversation between US President Joe Biden and Russian President Vladimir Putin, which was reported on July 9. According to The New York Times, Biden demanded that Putin take action against ransomware used to cyber-attack U.S. infrastructure.

In September, the REvil sites were up and running again. However, in October, according to the Washington Post, members of the US Cyber ​​Command managed to hack REvil’s computer infrastructure and disable it.

According to Chainalysis, victims of ransomware cyberattacks paid a ransom worth about $350 million in 2020. But the real profits of hackers using these viruses can be even higher.

In early November, the US State Department offered a $10 million reward for important information about Russian hackers using the DarkSide program. In May, because of the harm she had caused, she was for several days terminated work of a major American fuel supplier Colonial Pipeline.

[ad_2]

Source link

novichoktimes

novichoktimes

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Usefull Links

  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • UKRAINE
  • CARTOONS
  • News

© 2021-2023 Novichok (Moscow) Times

No Result
View All Result
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY

© 2021-2023 Novichok (Moscow) Times

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In