{"id":3312,"date":"2014-05-05T12:30:41","date_gmt":"2014-05-05T16:30:41","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3312"},"modified":"2021-03-01T21:19:19","modified_gmt":"2021-03-01T17:19:19","slug":"prosecutions-april-2014","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/prosecutions-april-2014\/3312\/","title":{"rendered":"Top Cybercriminal Prosecutions of April"},"content":{"rendered":"<p>It\u2019s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals. Here are the top prosecutions of April.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/05\/05111234\/busted-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4729\" alt=\"busted\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/05\/05111234\/busted-1.jpg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>Russian hacker faces extradition to USA<\/strong><\/p>\n<p>Russian hacker Vladimir Drinkman, involved in a group of cybercriminals and arrested in Netherlands almost two years ago, faces extradition requests by the US and Russia. The Local Ministry of justice will decide which country will get the lawbreaker as soon as Drinkman can still appeal on that. Anyway, it seems that the hacker will face several years in prison. Drinkman <a href=\"http:\/\/www.bloomberg.com\/news\/2014-04-17\/moscow-hacker-faces-extradition-requests-by-u-s-and-russia.html\" target=\"_blank\" rel=\"noopener nofollow\">is accused<\/a> of hacking more than a dozen retailers, payment processors and financial companies and getting the information of more than 160 million credit- and debit-cards. This case is supposed to be the biggest financial hacker attack in the US for the moment. Investigators say the gang was performing cybercrimes since at least 2007, causing losses of more than $300 million to some of the attacked companies. Besides Drinkman, there are four more people accused of computer attack conspiracy: three Russians and one Ukrainian.<\/p>\n<p><strong>8 years behind bars for using trojan<\/strong><\/p>\n<p>A Moscow court sentenced two young men for using the infamous Carberp trojan, which helped them steal money from bank accounts. Both guys were actively spreading the malware and getting unauthorized access to users\u2019 computers and online banking accounts. Having full control of a victim\u2019s PC, the impostors transferred money from the user\u2019s account to an account they controlled and then made withdrawals using ordinary ATMs. Doing this for at least half a year, the fraudsters successfully made no less than 90 transactions in three months, amassing a total fortune of around $3.6 million of victims\u2019 money before they were arrested. But obviously, now they don\u2019t have any chance to spend anything: one of the brothers faces 5 years in jail, while the other will spend eight years behind bars. It\u2019s interesting that the youngest of these two brothers reportedly has a major criminal background and was even wanted on an international arrest warrant, after being accused of realty fraud. The investigation was initiated by one of the biggest Russian banks and was performed by Russian cyberpolice with the help of experts from Netherlands and Canada.<\/p>\n<div class=\"pullquote\">The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.<\/div>\n<p><strong>Carder.su coordinator goes to court<\/strong><\/p>\n<p>Carder.su, one of the most infamous criminal enterprises, participants in which were highly wanted by law enforcement for last several years, has lost one of its main coordinators. In the first half of April, Cameron Harrison (also known as \u201cKilobit\u201d) from Georgia <a href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/04\/man-behind-carder-su-racketeering-other-cybercrime-pleading-guilty\/\" target=\"_blank\" rel=\"noopener nofollow\">agreed to plead guilty<\/a>. According to prosecutors, Harrison joined the Carder.su gang around six years ago and played a major role since: he was stealing credit card numbers and then helped to sell this information to other criminals. Although all these activities resulted in global losses of $50 million, authorities broke up the Carder.su group in 2012, charging 55 members for trafficking and manufacturing stolen and counterfeit credit cards. Now Harrison could potentially go to prison for as long as 20 years. He will also probably have to pay compensation for damage he did to the customers of a number of payment systems, such as Visa and MasterCard.<\/p>\n<p><strong>Using ZeuS will make you lose<\/strong><\/p>\n<p>Nine alleged members of a racketeering enterprise who infected thousands of business computers with malicious software known as ZeuS <a href=\"http:\/\/www.justice.gov\/opa\/pr\/2014\/April\/14-crm-375.html\" target=\"_blank\" rel=\"noopener nofollow\">have been charged<\/a> in an indictment in U.S. District Court in Lincoln, Nebraska. Two of them, Ukrainians Yuriy Konovalenko, 31; and Yevhen Kulibaba, 36, were charged with conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud and were recently extradited to the U.S. from the United Kingdom. The investigation was conducted with the help of police from America, Britain, Netherlands and Ukraine. Reportedly, both men were in charge of a ring of so-called \u2018money mules\u2019. These people are used as buffers, who are getting money from victims\u2019 bank accounts and passing them forward for further withdrawing. Konovalenko and Kulibaba each could face up to 40 years in prison. The other seven people still remain at large, but obviously not for long.<\/p>\n<p><strong>8 years for using KVM device<\/strong><\/p>\n<p>Nine members of a criminal gang <a href=\"http:\/\/crimeandjustice.co.uk\/2014\/04\/24\/nine-cyber-crime-gang-members-behind-major-bank-fraud-jailed-for-over-24-years\/\" target=\"_blank\" rel=\"noopener nofollow\">have been sentenced<\/a> to prison terms for stealing $2.1 million from Barclays bank using a special KVM device. Such hardware is used for accessing a number of remote PCs using just one set of keyboard, mouse and monitor. According to prosecutors, a KVM switch and a modem were implemented into the bank\u2019s computer system by one of the fraudsters who worked there as an invited computer technician. As a result, the gang had access not only to computers used in the bank, but to the whole internal network and all the info stored there. All the unauthorized transactions were performed from a nearby hotel. All the money the gang got was spent on designer jewelry, Rolex watches and other items. But now, all they have is prison time: every member will spend anywhere from 6 months to 8 years in jail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.<\/p>\n","protected":false},"author":214,"featured_media":3313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[93,445],"class_list":{"0":"post-3312","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybercriminals","9":"tag-security-news"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/prosecutions-april-2014\/3312\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/prosecutions-april-2014\/3426\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/prosecutions-april-2014\/3735\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/prosecutions-april-2014\/3837\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/prosecutions-april-2014\/3939\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/prosecutions-april-2014\/4728\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/prosecutions-april-2014\/3591\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/prosecutions-april-2014\/3939\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/prosecutions-april-2014\/4728\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/prosecutions-april-2014\/4728\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3312"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3312\/revisions"}],"predecessor-version":[{"id":18052,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3312\/revisions\/18052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3313"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}