Fancy cars, fine dining, creator mansions, cash: Triller is shelling out for talent

When talk of a possible TikTok ban began in July, the leaders of a small social video app called Triller saw a growth opportunity.

To attract users, the company set its sights on TikTok’s biggest names. Some of the Sway Boys, a group of TikTok influencers, had been toying with the idea of building their own app to compete with TikTok, but after a discussion with Ryan Kavanaugh, the majority owner of Triller and a veteran entertainment executive, they decided the platform could be good for them.

Triller offered the creators a deal: Tell your audience on TikTok that you’re moving to Triller, and we’ll give you equity and roles within the company. You can still post on TikTok, they were told, but only if you post on Triller more frequently. In turn, of the Sway Boys, Josh Richards, 18, was named Triller’s chief strategy officer, and Griffin Johnson, 21, and Noah Beck, 19, joined as advisers with equity.

Soon, CNBC, Fox News and the Los Angeles Times were writing about TikTok defectors bound for Triller, an app they described as a viable replacement for TikTok should a ban be put in place. In August, Triller announced it was seeking a new funding round of $250 million, hiking its valuation to over $1 billion.

But could it live up to the hype?

Getting that ‘Triller money’

Founded in 2015, Triller bills itself as an app for making professional-looking music videos, quickly. Functionally, it’s different from TikTok: It has different editing tools; its users can’t “duet,” or react to videos; and while it offers top singles and hit songs, it lacks the extensive library of sounds and mash-ups that TikTok users employ to express themselves.

“I think there’s a lot of things on Triller that TikTok doesn’t have and vice versa;

Russia’s Fancy Bear hackers likely penetrated a federal agency

SONY DSC

Boris SV | Getty Images

A warning that unidentified hackers broke into an agency of the US federal government and stole its data is troubling enough. But it becomes all the more disturbing when those unidentified intruders are identified—and appear likely to be part of a notorious team of cyberspies working in the service of Russia’s military intelligence agency, the GRU.

Last week the Cybersecurity and Infrastructure Security Agency published an advisory that hackers had penetrated a US federal agency. It identified neither the attackers nor the agency, but it did detail the hackers’ methods and their use of a new and unique form of malware in an operation that successfully stole target data. Now, clues uncovered by a researcher at cybersecurity firm Dragos and an FBI notification to hacking victims obtained by WIRED in July suggest a likely answer to the mystery of who was behind the intrusion: They appear to be Fancy Bear, a team of hackers working for Russia’s GRU. Also known as APT28, the group has been responsible for everything from hack-and-leak operations targeting the 2016 US presidential election to a broad campaign of attempted intrusions targeting political parties, consultancies, and campaigns this year.

The clues pointing to APT28 are based in part on a notification the FBI sent to targets of a hacking campaign in May of this year, which WIRED obtained. The notification warned that APT28 was broadly targeting US networks, including government agencies and educational institutions, and listed several IP addresses they were using in their operations. Dragos researcher Joe Slowik noticed that one IP address identifying a server in Hungary used in that APT28 campaign matched an IP address listed in the CISA advisory. That would suggest that APT28 used the same Hungarian server in the intrusion described by CISA—and that at