Vladimir Tsastsin lead the development of DNSchanger malware together with Timur Gerassimenko, Dmitri Jegorov, Valeri Aleksejev, Konstantin Poltev and Anton Ivanvov to help perpetrate a profitable clickjacking scheme that netted it $14 million in stolen advertising views. The malware pioneered the method of using social engineering techniques to deliver unobtrusive payloads used to hijack victims’ DNS settings in order to set up revenue streams based on their manipulated browsing. Law enforcement closed in on the takedown after a multiyear, public-private investigation it dubbed “Operation Ghost Click,” which was initiated nearly five years ago after researchers with Trend Micro brought the gang’s botnet to the attention of the Feds.