{"id":2285,"date":"2013-08-30T10:29:20","date_gmt":"2013-08-30T14:29:20","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2285"},"modified":"2017-05-19T07:28:12","modified_gmt":"2017-05-19T11:28:12","slug":"busted-0813","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/busted-0813\/2285\/","title":{"rendered":"Cybercriminal? Have a seat!"},"content":{"rendered":"<p>What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: \u201cWhat makes a criminal?\u201d You know \u2014 a typical criminal who gets sentenced to jail. He broke a law, that\u2019s a crime, and he\u2019s got to do his time. Even Dostoyevsky wrote about it. But it\u2019s a safe bet that cybercriminals never read Dostoyevsky, not to mention the fact that they probably have no idea about the expert community helping law enforcement investigate cybercrime. That\u2019s why arrests and real consequences are usually a huge surprise for hackers \u2014 they\u2019re confident that they\u2019re just too slick to get caught.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/08\/05101905\/busted_title_EN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2617\" alt=\"busted_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/08\/05101905\/busted_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p><b>The Oriental Express<\/b><\/p>\n<p>An entire group of hackers made up of at least 17 people were <a href=\"http:\/\/en.for-ua.com\/news\/2013\/08\/14\/155311.html\" target=\"_blank\" rel=\"noopener nofollow\">involved in Western Express<\/a>, a group that set out to steal credit card numbers. The name \u201cWestern Express\u201d was something the cops came up with, since the scammers used the American Western Express International network for their transactions. The prosecution in Manhattan stated that the hackers managed to take control of over 95,000 credit card numbers, which they subsequently sold. The damage they caused cashed in at roughly $5 million. Today, 11 members of the group have been sentenced.<\/p>\n<p>The Western Express group included citizens of a number of different countries, including Russians, Ukrainians, and Moldovans. The harshest sentence (up to 40 years) was handed out to the notorious Ukrainian hacker Yegor Shevelov, better known as Eskslubur or Esk, who was charged with the sale of 75,000 credit card numbers. The special services also arrested the administrator of the DumpsMarket forum, where sales of financial data were conducted. Yet at the same time, equally harsh sentences were handed out to the founders of the e-payment system WEI, Vadim Vasilenko and his wife Elena Barysheva, who were found in the investigation to have facilitated money laundering. They later confessed to everything.<\/p>\n<div class=\"pullquote\">The Western Express group included citizens of a number of different countries, including Russians, Ukrainians, and Moldovans. The harshest sentence (up to 40 years) was handed out to the notorious Ukrainian hacker Yegor Shevelov, better known as Eskslubur or Esk, who was charged with the sale of 75,000 credit card numbers.<\/div>\n<p><b>Die Hard<\/b><\/p>\n<p>Not everyone is so ready to admit to things. One Russian citizen in particular, Dmitri Smilanets, to this date refuses to confess his involvement in a case that is more or less closed. Even though his involvement has been pretty much proven, the evidence is there; with about 160 million credit cards that he compromised, the known virtual venues victimized in connection with him and his associates, and at least $300 million claimed against him in lawsuits. But he won\u2019t give! He says he\u2019s just the owner of the cyber-sports club Moscow Fife, and not any kind of thief. Nevertheless, law enforcement has reason to believe otherwise. Dmitri\u2019s got sidekicks whose guilt has already been proven. But we\u2019ll have to wait and see how it all ends.<\/p>\n<p><b>Top Secret<\/b><\/p>\n<p>Reynaldo Rivera is facing charges of disclosing personal information in the US. He was sentenced to jail time for his involvement in the group hacking of the <a href=\"https:\/\/threatpost.com\/second-lulzsec-member-arrested-sony-pictures-attack-082812\/76961\" target=\"_blank\" rel=\"noopener nofollow\">Sony Pictures Entertainment network<\/a>. In 2011, Rivera was a member of the group Lulzsec, which penetrated the servers and stole the personal and registration data of several hundred thousand participants in contests held by Sony. Lulzsec then made all of that data publicly available. Even though no financial damages were incurred, the disclosure of that kind of personal information is prohibited by law. In addition to one year in jail, River also faces a fine of $605,000.<\/p>\n<p><b>Attack thwarted<\/b><\/p>\n<p>In Russia, the Tushinsky Court of Moscow has sentenced Pavel Vrublevsky to 2.5 years in prison. He was a shareholder in the Chronopay e-payment system. According to the facts uncovered in the investigation, Vrublevsky ordered DDoS attacks against a competing e-payment system, Assist, in 2010. The aim of the attacks, according to the investigation, was to undermine the contract between Aeroflot and Assist \u2013 Chronopay\u2019s competitor on the online payment market \u2013 in the hope that it would be terminated. This case is particularly remarkable as it is the first instance in Russian law in which <a href=\"https:\/\/threatpost.com\/head-russian-payment-processor-chronopay-arrested-062511\/75368\" target=\"_blank\" rel=\"noopener nofollow\">an actual sentence has been handed out to both the organizer and the executors of a DDoS attack<\/a>.<\/p>\n<p><b>Nothing to do with me!<\/b><\/p>\n<p>Denis Chalovsky, a citizen of Latvia, has found himself in an uncomfortable situation. His fate will now be determined through major hearings in the European and American justice systems. The US believes Denis is a major criminal \u2014 according to their data, Chalovsky worked with Russian citizen Nikita Kuzmin and Romanian citizen Mikhai Paunesku to create and disseminate the Gozi virus, which has infected over one million computers around the world. The virus was used by the group to hack into tens of thousands of bank accounts and the damages wracked up to tens of millions of dollars. The victims of the Gozi virus include 160 NASA computers. In total, the charges against Denis add up to 67 years in prison. However, there is another side to the story.\u00a0Denis himself denies the charges, and he has witnesses on his side testifying that he has never been capable of creating this kind of Trojan, since he only knows how to repair computers, but is far from a capable programmer. This case gets complicated when it comes to the issue of Denis\u2019s extradition to the US authorities, who have no direct evidence of Chalovsky\u2019s guilt. In his defense, Denis has the backing of European civil rights organizations, who are speaking out against his charges. And this gives us something to think about\u2026<\/p>\n<p><b>Interpol: Shanghai <\/b><b>calling<\/b><\/p>\n<p>For the first time in history, Shanghai\u2019s online police collaborated with Interpol to <a href=\"http:\/\/www.china.org.cn\/china\/2013-08\/23\/content_29808105.htm\" target=\"_blank\" rel=\"noopener nofollow\">capture the leader of a group<\/a> that has stolen roughly 30 million Yuan ($4.9 million) from trusting citizens. Over two thousand Chinese users were victimized by a group of five hackers hiding out in Thailand. All of them were captured, except for a certain Mr. Van, who was found to be the leader of the group and who is still in hiding. Reports say that Mr. Van has already served the standard 14-month term usually handed out to hackers. In 2009, a car auction was cancelled that resulted in him facing criminal charges. Just over a year later, Mr. Van had served his sentence, but had obviously not experienced any type of \u201crehabilitation\u201d in jail. In the more recent case, he was the ringleader of the group in question, coming up with the plans and giving out specific instructions to his subordinates. He continued to make money \u2013 indirectly \u2013 through a clever, complex setup. Only, as it turned out, he wasn\u2019t able to completely cover his tracks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: \u201cWhat makes<\/p>\n","protected":false},"author":35,"featured_media":2286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[93],"class_list":{"0":"post-2285","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybercriminals"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/busted-0813\/2285\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/busted-0813\/2377\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/busted-0813\/2465\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/busted-0813\/2316\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/busted-0813\/2616\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/busted-0813\/2616\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/busted-0813\/2616\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2285"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2285\/revisions"}],"predecessor-version":[{"id":7724,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2285\/revisions\/7724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2286"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}