The US Government Just Doxxed The Biggest Cybercriminal...

SomeOrdinaryGamers
7 May 202413:48

Summary

TLDRThe FBI and international law enforcement agencies have taken down one of the world's most notorious cybercriminals, Dimitri Yovich Kosev, who is believed to be the mastermind behind the LockBit ransomware. The operation, dubbed 'Kronos,' involved the UK, US, and Australia, and has led to Kosev being charged with multiple counts, including violations of the Computer Fraud and Abuse Act. The LockBit ransomware has caused billions in damages and targeted over 2,000 victims, demanding over $100 million in ransom payments. The National Crime Agency of the UK has also taken control of the group's blog, and the US Department of State has offered a $10 million reward for information leading to Kosev's arrest. The case highlights the severe consequences cybercriminals face as law enforcement ramps up efforts to combat digital threats, with the potential for new groups to emerge in the power vacuum left by the dismantled ones.

Takeaways

  • 📣 The FBI and international partners have taken down a major cybercriminal, comparing the event's significance to the takedown of Bin Laden for internet users.
  • 🌐 The National Crime Agency of the UK made an official announcement, building anticipation for the unveiling of a key figure in cybercrime.
  • 🔍 Dimitri Yovich Kosev, identified as a key administrator and developer of the LockBit ransomware, has been named and indicted.
  • 🚨 LockBit ransomware has caused significant harm, targeting over 2,000 victims and extorting more than $100 million in ransom payments.
  • 💻 The concept of ransomware involves encrypting a victim's files and demanding payment for their release, which can be particularly devastating for large organizations.
  • 🏥 The impact of ransomware on critical infrastructure like hospitals is severe, potentially putting lives at risk and causing major disruptions.
  • 💰 The US government, through the Department of State, has offered a reward of up to $10 million for information leading to the arrest of Dimitri Kosev.
  • 🔗 A special website, no-more-ransom.org, provides decryptors to help victims recover from ransomware attacks without paying the ransom.
  • 🔍 Kosev has been added to the Specially Designated Nationals (SDN) list, severely limiting his travel freedom.
  • 🤔 There is speculation that the individual named by the FBI might not be the true mastermind behind LockBit, with some suggesting the FBI could be mistaken.
  • 🔥 The takedown of significant cybercriminal figures or groups often leads to a power vacuum, where new groups emerge to take their place.

Q & A

  • What significant event did the FBI recently accomplish in the realm of cybercrime?

    -The FBI recently took down and named one of the biggest cybercriminals in the world, an event likened to the bin Laden takedown for internet security experts.

  • Which government agency made an official announcement regarding the cybercriminal takedown?

    -The National Crime Agency of the United Kingdom made the official announcement.

  • What was the nature of the announcement made by the UK's National Crime Agency?

    -The announcement was about the unmasking and sanctioning of a leader of a harmful cybercrime group by the UK, US, and Australia, following an international destruction campaign named #Kronos.

  • Who was identified as the head administrator of the harmful cybercrime group?

    -Dimitri Yovich Kosev was identified as the head administrator and main figure behind the cybercrime group.

  • What is Locky ransomware, and how does it operate?

    -Locky ransomware is a malicious software that encrypts files on a victim's computer. The criminals behind it demand payment in exchange for the decryption key needed to restore access to the files.

  • What are the implications of a ransomware attack on large organizations like hospitals?

    -A ransomware attack on a large organization like a hospital can be extremely dangerous, as it can disrupt critical services and potentially put lives at risk if systems cannot be quickly restored.

  • How did the US Justice Department and UK law enforcement disrupt the Locky ransomware group?

    -They disrupted the group by charging the alleged developer and administrator of the ransomware, alleging that he targeted over 2,000 victims and stole more than $100 million in ransom payments.

  • What is the significance of the individual being added to the SDN list?

    -Being added to the Specially Designated Nationals (SDN) list severely restricts the individual's freedom to travel internationally, as they are often limited to visiting countries that do not respect the SDN list.

  • What steps are taken by the authorities to assist victims of ransomware attacks?

    -Victims can fill out a form to get access to decryptors available at websites like nomoreransome.com, which can help restore encrypted files without paying the ransom.

  • What was the reward offered by the Department of State for information leading to Dimitri Kosev?

    -The Department of State offered up to $10 million for information leading to Dimitri Kosev for violations including the Computer Fraud and Abuse Act.

  • How did the authorities publicize their actions against the cybercriminal?

    -The authorities publicized their actions by taking over the cybercriminal's blog, posting official notices, and setting countdown timers to their leaks, making it clear that law enforcement had seized control.

  • What was the reaction of the cybercriminal group Locky to the authorities' actions?

    -Locky claimed that the FBI was bluffing and that they had doxed the wrong individual, implying that the person named by the authorities was not the real mastermind behind the ransomware operations.

Outlines

00:00

📰 Major Cybercriminal Takedown Announced

The video discusses the recent announcement by the FBI and UK's National Crime Agency about the takedown of a major cybercriminal. The individual, Dimitriyovich Kosev, is accused of being the head administrator and developer of the LockBit ransomware group. The authorities have unmasked and sanctioned Kosev, who has targeted over 2,000 victims and stolen over $100 million in ransom payments. The video provides a detailed overview of the case, the ransomware's impact on critical infrastructure like hospitals, and the government's efforts to combat such cybercrime.

05:01

💸 $10 Million Bounty and Indictment Details

This paragraph delves into the specifics of the charges against Dimitriyovich Kosev and the $10 million bounty offered by the US Department of State for information leading to his arrest. Kosev has been indicted on 26 counts, including violations of the Computer Fraud and Abuse Act. The video also discusses the impact of the indictment on the LockBit group's operations and the potential for other ransomware groups to emerge in its place. The speaker speculates on the accuracy of the government's identification of Kosev and the possibility of the real culprit still being at large.

10:02

🔓 Decryptors and Future of Ransomware Groups

The final paragraph talks about the resources available to victims of ransomware attacks, such as the No More Ransom website where decryptors can be downloaded. The video also touches on Kosev being added to the Specially Designated Nationals (SDN) list, which severely limits his travel. The speaker explores the possibility of the LockBit group disbanding and another group taking its place to continue ransomware operations. The video concludes with a call to action for viewers to like, comment, and subscribe for more content on this topic.

Mindmap

Keywords

💡Cybercriminal

A cybercriminal is an individual who uses the internet or other digital networks to commit crimes, such as identity theft, fraud, or malware distribution. In the video, the term is used to describe the individual who is identified as a major figure in cybercrime, with the FBI taking down a significant cybercriminal, which is likened to the 'bin Laden takedown' for internet users.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. It is a significant theme in the video, as the discussion revolves around the Locky ransomware, its impact on various sectors including hospitals, and the legal actions taken against its alleged developer.

💡NCA (National Crime Agency)

The National Crime Agency is a UK government law enforcement organization that combats serious and organized crime. In the video, the NCA is mentioned as one of the agencies involved in the operation that led to the unmasking and sanctioning of the cybercrime group leader.

💡Dimitri Yovich Kosev

Dimitri Yovich Kosev is identified in the video as the alleged head administrator and developer of the Locky ransomware. His identification is a key event in the video, as it represents a significant milestone in attributing responsibility for major cybercrimes to specific individuals.

💡Locky Ransomware

Locky is a specific variant of ransomware that has been responsible for widespread cyber attacks and financial losses. The video discusses the impact of Locky, including its encryption of files and the subsequent demands for ransom payments to restore access to the affected systems.

💡Decryptors

Decryptors are tools or software used to reverse the encryption process applied by ransomware, allowing victims to regain access to their files without paying a ransom. The video mentions a website called 'No More Ransom' where victims can download decryptors to help recover from ransomware attacks.

💡Specially Designated Nationals (SDN) List

The SDN List is a list maintained by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) that identifies individuals and companies with which U.S. persons are generally prohibited from conducting transactions. In the video, it is mentioned that Kosev has been added to this list, severely limiting his financial and travel freedoms.

💡Deep Web

The deep web refers to parts of the internet not indexed by traditional search engines, which can include various websites and services that are not publicly accessible. The video discusses the deep web in the context of accessing hidden blogs and websites related to cybercriminal groups and their activities.

💡Bitcoin Wallet Address

A Bitcoin wallet address is a unique identifier used in transactions on the Bitcoin network. It is mentioned in the video in relation to tracking and potentially recovering funds associated with the ransom payments made to the cybercriminal group.

💡Bounty

A bounty in this context refers to a reward offered by the U.S. Department of State for information leading to the arrest or conviction of a wanted individual, in this case, Dimitri Kosev. The video highlights a $10 million bounty as an example of the high priority placed on apprehending significant cybercriminals.

💡VX Underground

VX Underground is mentioned as a source of information within the video, suggesting it is a community or platform where information about malware and cybercrime is shared. It is used as an example of how different groups or entities might have varying perspectives on the identity and actions of the cybercriminal in question.

Highlights

The FBI and international partners have taken down one of the world's most notorious cybercriminals, comparing the event to the bin Laden takedown for the internet.

The National Crime Agency of the UK made an official announcement, teasing an imminent reveal concerning a cybercrime group leader.

A 24-hour countdown was set by the UK government, building anticipation similar to a major video game trailer release.

The UK and US, along with Australia, unmasked and sanctioned a leader of a harmful cybercrime group following an international destruction campaign named #Kronos.

Dimitri Yovich Kosev was identified as the head administrator and producer of a dangerous malware, with a video revealing his image.

The US Justice Department charged Kosev, a Russian national, with developing and operating LockBit ransomware, causing significant damage since September 2019.

LockBit ransomware encrypts files on a victim's computer, demanding payment for decryption, which can be particularly devastating for large organizations.

The ransomware attacks on critical infrastructure like hospitals represent a serious threat, potentially putting lives at risk.

The FBI and partners disrupted the LockBit ransomware group, charging the alleged developer who has targeted over 2,000 victims and stolen more than $100 million in ransom payments.

A $10 million bounty was offered by the US Department of State for information leading to Dimitri Kosev, highlighting the severity of his alleged crimes.

NoMoreRansom website was mentioned, offering decryptors to help victims of various ransomwares recover their files without paying.

Kosev was added to the Specially Designated Nationals (SDN) list, severely limiting his travel freedom.

The individual's iCloud email and Bitcoin wallet address were discovered, with the wallet showing significant transactions.

VX Underground reported that the FBI might have the wrong individual, as claimed by the LockBit group, suggesting that the real perpetrator remains at large.

The speaker predicts that even if the LockBit group disbands, another group will likely emerge to fill the power vacuum in the cybercrime ecosystem.

The government's unprecedented move to publicly 'dock' an individual highlights the seriousness with which they are taking cybercrime.

Transcripts

00:00

hello guys and gals me

00:03

mudahar the FBI just took down and named

00:07

and docked to one of the biggest cyber

00:09

criminals in the

00:11

world today today is like the the the

00:14

bin Laden takedown for the internet

00:16

nerds okay ladies and gentlemen it's a

00:19

wild day today I want to just start off

00:21

with a little video I want to start off

00:22

with something that is a bit surreal

00:24

almost Black Mirror is if you want to

00:26

talk about it okay now this is a post by

00:28

the National Crime agency of the United

00:31

Kingdom okay you can tell they are a

00:33

government verified Branch with that

00:35

little gray check mark in the

00:38

top so here they said official

00:40

announcement in 24 hours watch the space

00:43

now see this isn't like a Apple keynote

00:46

this isn't like a Kendrick versus Drake

00:48

beef track Throwdown where they're like

00:50

check out our SoundCloud boys we're

00:53

dropping some spicy pedo allegations

00:55

today crazy stuff no this is the

00:59

government willing to leak out and docks

01:01

an individual telling everyone to wait

01:02

24 hours like they're releasing the next

01:05

Grand Theft Auto 6 trailer so

01:07

immediately when I saw this I'm like boy

01:10

I cannot imagine that we live in a world

01:12

where where the government is prepping

01:14

and hyping me up for a little bit of a

01:15

docks now I'm glad to say that the

01:17

United Kingdom did not back down from

01:19

their announcement here ladies and

01:21

gentlemen they did in fact leak out the

01:23

actual ad over here so for instance this

01:25

is the post that came out 24 hours later

01:27

and why I waited actually got all my

01:29

stuff assembled to film this a leader of

01:31

what was once the most harmful cyber

01:33

crime group has been unmasked and

01:34

sanctioned by the UK us and Australia

01:37

following an NCA Le International

01:39

destrution campaign # Kronos and then

01:42

they added the FBI and [ __ ] europ

01:45

pole dude so of course I'm not joking

01:48

with you here's the video right now they

01:50

actually have a mosaic effect and yeah

01:53

boy that's her guy that's him Dimitri

01:58

yovich kosev which is basically

02:01

apparently they they're fingering as the

02:02

head administrator the [ __ ] producer

02:05

of this actual scary piece of malware

02:08

now of course he looks like you're a

02:09

traditional LinkedIn developer for any

02:11

crypto project you got the airpod to the

02:14

side you got him standing up looking all

02:16

intimidating this is vital in the

02:18

digital Space Universe

02:20

okay whereas influencer vital is out

02:23

there like apparently beating up

02:25

pedophiles and Flash banging them in

02:27

reality we've got digital vitality

02:29

digital digital

02:31

vital run running running goddamn

02:35

ransomware groups now obviously ladies

02:38

and gentlemen this is some pretty

02:39

serious stuff so I shouldn't really be

02:40

laughing okay now according to the

02:43

federal bureau they charged him a

02:45

Russian national with developing and

02:46

operating lock bit ransomware so again

02:49

the US justice department unsealed

02:51

charges against a Russian for his

02:53

alleged role as the Creator developer

02:55

and admin of the lock bit ransomware

02:57

group from its Inception in September

02:59

2019 to the present So for anybody that

03:01

doesn't know lock bit ransomware uh we

03:04

did virus investigations and I covered

03:06

this virus in the past where it was

03:08

basically ransomware and ransomware once

03:10

you've seen it once isn't really super

03:12

terribly exciting the concept is you

03:14

download a piece of their sample you run

03:16

it on your computer and eventually all

03:18

the files on your system will be taken

03:20

over and encrypted using a special key

03:22

that is generated and sent off to lock

03:25

bit now lock bit who possesses this key

03:27

basically tells you pay us a certain

03:29

amount of money and we'll send you a

03:31

decryption software that will unencrypt

03:34

all of the software and files on your

03:36

system so you can use your computer

03:38

again now if you get hit with ransomware

03:41

uh it's probably not the end of the

03:43

world for you okay you can reset things

03:45

maybe you'll have some backups but for a

03:47

big company and the larger and larger

03:50

your companies become the more tough it

03:52

becomes to Simply restore from a backup

03:55

okay let's say you're running a bank a

03:57

hospital one of the largest casino in

04:00

the world okay if you get hit with

04:01

ransomware it's a it's it's a massive

04:04

headache of figuring out how you got hit

04:06

where you got hit do you even have the

04:09

backups or or and whatnot to come back

04:12

to a reasonable State it's a lot of

04:14

headaches okay now it gets almost

04:17

dangerous evil and downright diabolical

04:20

when you're attacking hospitals for

04:22

instance right now imagine attacking a

04:24

hospital you know they get hit with

04:26

ransomware something critical gets you

04:28

know sort of stopped and if they can't

04:30

afford to pay a ransom or they can't

04:31

afford to give the money away especially

04:33

when there are people on the on the on

04:36

the verge of life and death that becomes

04:38

a serious issue that cannot be scoffed

04:40

at okay so that's why the world

04:43

governments get really mad about this

04:45

it's not just what they're doing to big

04:46

companies it's the fact that they attack

04:48

government infrastructures schools and

04:51

hospitals especially hospitals belonging

04:53

to sick children so when the FBI here

04:56

said earlier this year the justice

04:57

department and our UK law enforcement

04:59

partners disrupted lock bit a ransomware

05:01

group responsible for attacks on victims

05:03

across the US and the world today

05:05

they're going a step further in charging

05:07

the individual who they allege again

05:10

this isn't confirmed they allege

05:12

developed and administered this

05:13

malicious cyber scheme who has targeted

05:15

over 2,000 victims and stolen more than

05:18

$100 million Us in ransomware payments

05:22

and they will continue to work closely

05:24

to make sure this stuff is taken care of

05:26

so again going in further over here they

05:28

name Dimitri yich corev also known as

05:32

the screen name lock bit Su and of

05:35

course Putin crab of voron Von Russia

05:40

again my Russian isn't exactly the best

05:42

okay so feel free to laugh at it and of

05:44

course this is a 26 page 26 count

05:47

indictment by the grand jury in the

05:49

district of New Jersey so yeah this is

05:51

some serious serious [ __ ] and what they

05:53

allege is they launched one of the most

05:55

prolific ransomware variants causing

05:57

billions of dollars in losses and Rec

05:59

havoc on critical infrastructures

06:01

including schools and hospitals so yeah

06:04

like I said really dangerous [ __ ] when

06:06

you start messing around with groups

06:08

like this when you start messing around

06:10

with critical stuff like this the

06:11

government is going to come on you as

06:13

hard as they've ever come on for any

06:15

actual criminal out there okay you are

06:17

about just as evil to them as some Isis

06:20

terrorist or some Mexican drug cartel

06:22

operative or really any highlevel

06:25

criminal so when you look into like the

06:27

reporting form over here too even lock

06:29

bit has special form so now that they've

06:31

gotten access they can assist people

06:33

that have been hit with various versions

06:35

so if you are hit with this [ __ ] fill

06:36

out this form you probably already know

06:38

if you have been hit in a serious

06:40

capacity and you've done it but that's

06:42

generally the idea here so again to give

06:45

you an idea of what websites and what

06:47

groups look like when they've been

06:48

infected and taken down when their

06:50

websites or their blogs get hijacked it

06:53

looks a lot like this the site is now

06:55

under control of law enforcement the

06:57

site is now under control of the

06:58

National Crime agency of the UK so this

07:00

is what it looked like when people tried

07:02

accessing lock bits blogs they grabbed

07:04

access to the servers Keys whatever and

07:07

basically threw this [ __ ] up there to

07:09

basically look and make it appear and

07:11

make it well known that they took down a

07:14

Blog and a serious group now because

07:16

this is crypto stuff because this is

07:17

Deep Web stuff because this is you know

07:19

groups fighting for each other websites

07:21

and groups and various [ __ ] will pop up

07:23

over over time but let's look at the

07:26

actual blog that has been hijacked by

07:28

the federal government so again this is

07:31

a deep web link page all right and again

07:33

this is the onion link over here that I

07:35

may or may not blur depending on how

07:37

YouTube's to goes in regards to I guess

07:40

popularizing this kind of content but to

07:42

give you an idea of how to find this

07:44

kind of [ __ ] all right one of the ways

07:46

that we end up finding it is through

07:48

various group websites so for instance

07:50

all these links you see on the left are

07:52

groups that are again ransomware groups

07:56

uh you know cyber cyber warfare groups

07:58

you can imagine right there's a whole

08:00

bunch of them right here and again they

08:02

all have different blogs and they all

08:04

have onion links leading two set blogs

08:07

so what we effectively do over here is

08:09

we highlight a link or at least the most

08:11

available one and we just get access to

08:14

it so these are onion links and they

08:16

fluctuate all the time as you know if

08:18

you've ever watched me cover the Deep

08:19

Web on my channel so this is lock bit

08:22

seized address and of course if you're

08:24

looking at all of these Pages you can

08:26

see that this is the government

08:27

basically putting down countdown

08:29

timers to all of their leaks so for

08:32

instance they will close the website in

08:34

a matter of days so this is if you

08:36

wanted to look at this website with your

08:38

own eyeballs this is like the last

08:40

chance okay after this the government

08:42

will take this down not to say that a

08:45

lock bit group that still exists a cell

08:47

won't have another website open but this

08:49

is your last chance to catch up on some

08:51

cyber warfare history so in this

08:54

situation they've given their press

08:55

releases which we've looked at the FBI

08:57

one we looked a bit at the UK one but

08:59

they gave the $10 million question right

09:02

the Bounty out here right and if you

09:03

look into the Bounty you can see that

09:05

the $10 million question which it's

09:07

interesting how they're releasing this

09:08

at 1337 whatever BST is I I feel like

09:12

the feds now are run by actual meme

09:15

Lords like they're run by actual memers

09:17

for channers that have grown up to work

09:19

with the actual federal bureau it's

09:21

insane so here it is lock bits up so the

09:24

US government literally unsealed this

09:27

name now there is a chance in my opinion

09:30

that this name could be wrong right but

09:33

I think the chance for that is highly

09:35

unlikely because I don't think the US

09:38

government is willing to leak out wrong

09:40

information for the sale for for the

09:42

sake of being I think they would put

09:44

themselves in a serious legal problem

09:47

and they would really be ruining their

09:49

reputation if they turned out to be

09:51

doxing the wrong individual but anyways

09:54

the Department of State through their

09:55

award program offered up to $10 million

09:58

for information about this [ __ ] dude

10:00

right here so that is a $10 million

10:02

award leading to Dimitri kosev for

10:05

violations including the Computer Fraud

10:07

and Abuse Act okay now if you've been

10:09

hit with this guy's ransomware they

10:11

direct you to a website known as no more

10:13

Ransom where you can actually download

10:15

decryptors right now to help you out

10:18

with whatever you've gotten so if you've

10:20

been ever hit with any bit any any of

10:22

these ransomwares you can basically

10:24

download these decryptors and take care

10:26

of yourself right over here it actually

10:28

would be fun to show you how ransomware

10:30

gets ransomed and then ransomware gets

10:32

decrypted it would be fun to discuss

10:33

this with you so let me know what you

10:34

want we can look at the mafia Weare 666

10:38

decryptor if you want you know as a meme

10:41

but of course ladies and gentlemen to go

10:42

further into it uh obviously the guy was

10:44

added to the sdn list which is the

10:46

specially designated Nationals once

10:48

you've been added to this list your

10:50

freedom of travel anywhere in the world

10:52

is so limited to the point where you I

10:54

think you can only visit like four or

10:56

five countries I think it's like China

10:58

Russia Iran North and that's pretty much

11:00

what it comes down to you know countries

11:01

that don't necessarily respect the sdn

11:04

list because they're large enough

11:06

countries on their own so kosev gets

11:08

added to this list and they find out

11:10

that his iCloud email kev1 icloud.com

11:14

that could be a burner but I don't know

11:17

sometimes dudes will just have MacBooks

11:18

or anything sitting around like full

11:20

addresses not thinking that they can

11:22

actually get screwed at some point and

11:25

of course what they've actually got is

11:27

his Bitcoin wallet address so so I

11:29

opened the Bitcoin wallet address up too

11:31

and it's funny because you look through

11:32

this address and the only volume it's

11:35

ever gotten well total received and sent

11:37

was around $4

11:38

47,7 33 so obviously not the total

11:42

amount of cash that this person has ever

11:44

had uh just because if you look through

11:46

their original statements back in like

11:48

February the guy literally says that

11:50

they work for like hundreds of millions

11:52

of dollars so clearly they've got a lot

11:54

of money that they've made through this

11:56

where that money is I'm sure the federal

11:58

bureau and every organization is going

12:01

to try to find and track down especially

12:03

if it's in crypto which makes it a

12:05

little bit easier for them too depending

12:07

on how it's laundered or whatnot or

12:08

moved around but again beyond all of it

12:11

one of the things that I wanted to also

12:12

showcase was VX underground great friend

12:15

of the channel ended up actually talking

12:17

or getting you know information from

12:19

this group lock bit and apparently they

12:21

said that the FBI they're bluffing all

12:23

right this isn't the real individual in

12:26

fact if somebody else you know that

12:28

they've doxed they will get [ __ ] for

12:30

their sins implying that basically the

12:33

wrong person is arrested the FBI found

12:35

the wrong person now whether lock bit is

12:38

right and the FBI is just fingering some

12:40

random guy for no reason that I think is

12:44

a pretty massive claim so for this

12:46

moment in time I think that pretty much

12:48

most of the policing agencies have

12:50

basically done what they can to find

12:52

these individuals and for the most part

12:54

it seems like this lock bit group May

12:56

potentially die off but that just means

12:59

that a power vacuum gets made and

13:01

another group takes the reins look at

13:03

the end of the day money is money all

13:05

right if there's hundreds of millions of

13:07

dollars to be made through criminal

13:09

activities what I have learned through

13:11

history alone is that another group will

13:13

just come out of the ashes and basically

13:15

run the gamut themselves and that's

13:18

pretty much where I think this situation

13:20

is unfortunately added down to so yeah

13:22

this guy uh came out of the Woodworks uh

13:25

the FBI you know basically kept hunting

13:27

them down they put on a bounty and uh

13:29

it's funny to see that the government

13:31

has straight up doxed an individual like

13:33

they actually hyped up a dock I cannot

13:35

believe that I actually have to see

13:38

things play out that way but yeah that's

13:41

pretty much what it comes down to ladies

13:42

and gentlemen this is me mudahar and if

13:43

you like what you saw please like

13:45

comment and subscribe dislike it if you

13:46

dislike it I am out

Rate This

5.0 / 5 (0 votes)

العلامات ذات الصلة
CybercrimeFBILockBitRansomwareCybersecurityHackingLaw EnforcementDigital ThreatsCryptocurrencyDeep Web
هل تحتاج إلى ملخص باللغة العربية؟