{"id":3468,"date":"2014-06-06T13:29:09","date_gmt":"2014-06-06T17:29:09","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3468"},"modified":"2017-09-24T18:38:17","modified_gmt":"2017-09-24T14:38:17","slug":"busted-may-2014","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/busted-may-2014\/3468\/","title":{"rendered":"Busted! Top Prosecutions of May"},"content":{"rendered":"<p>There was a lot of interesting news about hackers and other cybercriminals, so let\u2019s see who has been busted in May and what they got for breaking the law.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111322\/busted-compressor-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5030\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111322\/busted-compressor-1.jpg\" alt=\"busted-compressor\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>\u00a0<\/p>\n<h4><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104839\/Sabu.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3484\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104839\/Sabu.jpg\" alt=\"Sabu\" width=\"250\" height=\"292\"><\/a>LulzSec leader sentenced to seven months<\/h4>\n<p>The LulzSec hacker-turned-informant known as Sabu avoided any more jail time and was sentenced to time served on Tuesday for his part in leading several of the group\u2019s attacks on high-profile targets. Hector Monsegur walked out of court in New York a free man, thanks to his cooperation with the FBI in identifying and tracking down many other members of the group and helping the agency prevent further attacks. Monsegur was a prominent member of LulzSec hacktivist groups, and authorities accused him of being involved in a number of the group\u2019s operations, including attacks against PayPal and other companies. When he was arrested by the FBI in 2011, Monsegur began cooperating and supplying information to the agency about the activities of other Anonymous members. Prosecutors asked the judge to grant Monsegur lenience in his sentence, but didn\u2019t make a specific recommendation in terms of a jail sentence. Monsegur won\u2019t spend any more time in jail, but will be under court-supervised release for one year.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>97 hackers were arrested for using Blackshades trojan, its author faces 20 years in jail #security #busted<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fqm2G&amp;text=97+hackers+were+arrested+for+using+Blackshades+trojan%2C+its+author+faces+20+years+in+jail+%23security+%23busted\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h4><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104842\/BlackShades.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3481\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104842\/BlackShades.jpg\" alt=\"BlackShades\" width=\"220\" height=\"230\"><\/a>Hundred hackers a time<\/h4>\n<p>One of the biggest prosecutions of May was definitely the case of 97 hackers who were accused of using Blackshades remote access trojan. The malware was available on criminal forums for as little as $40, giving criminals the ability to remotely turn victims\u2019 computers into surveillance devices. The FBI said the RAT was sold and distributed to thousands in more than 100 companies and is responsible for more than 500,000 infections. The RAT also had the capability of spreading itself to other machines by spoofing malicious links to social network contacts or over IM platforms. The takedown included the cooperation of law enforcement in 19 countries and involved more than 300 searches. It\u2019s not clear what these criminals will get in terms of fines and jail time, but the developers of the Blackshades malware (who are presumably Swede Alex Yucel, 24, and American Michael Hogue, 23 of Arizona) can get up to 20 years behind the bars.<\/p>\n<h4><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104841\/DavidRayCamez.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3482\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104841\/DavidRayCamez.jpg\" alt=\"DavidRayCamez\" width=\"230\" height=\"280\"><\/a>20 years for selling fake cards<\/h4>\n<p>David Ray Camez, 22, also known as \u201cBad Man\u201d and \u201cdoctorsex,\u201d was sentenced by a U.S. District Judge in the middle of May. Camez was convicted at the end of 2013, of one count of participating in a racketeer influenced corrupt organization and one count of conspiracy to participate in a racketeer influenced corrupt organization. The young man joined Carder.su six years ago and was buying and selling fake IDs and credit cards during two years. Camez was one of 39 charged in an indictment returned in January 2012. Seven others have pleaded guilty, two are scheduled for trial in June, and the rest are fugitives. Sixteen other defendants were also charged in the scheme in three separate indictments, and 14 have pleaded guilty to date. In addition to his prison term, which is 20 years, Camez was also sentenced to serve three years of supervised release and ordered to pay $20 million in restitution.<\/p>\n<h4><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104840\/Peter%2BSunde.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3483\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05104840\/Peter%2BSunde.jpg\" alt=\"Peter+Sunde\" width=\"200\" height=\"267\"><\/a>Pirate Bay co-founder arrested<\/h4>\n<p>On the last day of May, Peter Sunde, one of the founders and a ex-spokesman of The Pirate Bay torrent tracker, was arrested in Sweden by Interpol. Prosecutors had searched for Sunde for more than two years after his sentence was made final in 2012 by Sweden\u2019s Supreme Court, which announced its decision not to grant leave to appeal in the long-running criminal case against the founders of The Pirate Bay. After that, Sunde submitted his case to the European Court of Human Rights and to the Swedish Supreme Court, but both were rejected. Now Sunde is about to serve 8 months sentence. Another two activists has left prison and another Sunde\u2019s colleague is still trying to avoid justice, hiding somewhere in Asia.<\/p>\n<div class=\"pullquote\">Participaiting in a racketeer-influenced corrupt organization can cost you 20 years of your life.<\/div>\n<h4>The largest-ever operation targets fake medicines<\/h4>\n<p>Around 200 enforcement agencies across more than a hundred countries have taken part in Operation Pangea 7 which targeted criminal networks behind the sale of fake medicines via illicit online pharmacies. The operation has ended with more that 230 arrests worldwide and the seizure of nearly $36 million worth of potentially dangerous medicines. During the operation 1,235 investigations were started, nearly 20,000 adverts for illicit pharmaceuticals via social media platforms were removed, more than 10,000 websites were shut down and 9.4 million fake and illicit medicines were seized. This international operation was coordinated by Interpol and helped by the number of organizations, including World Customs Organization, Center for Safe Internet Pharmacies, and some companies like Microsoft, PayPal, MasterCard and Visa.<\/p>\n<h4>Text Spammer gets a huge fine<\/h4>\n<p>Phil Flora, who is also known as Phil P. and was in charge of a text message spamming operation, has been ordered to pay more than $148,000 for operating the scam. He sent more than 29 million text messages to consumers promising \u2018free\u2019 gift cards. The scam was quite simple: after the victim clicked the link, a form appeared asking the user to fill it out in order to get a free $1,000 gift card from Walmart, but when user did this he was asked to visit several links. Obviously, the information which was filled in by the victim, was then used for spamming. The scam became a problem for some retailers. In a declaration filed with the FTC\u2019s lawsuit director of privacy for Walmart Stores said the retailer received at least 14,000 complaints. The scam cost the company more than $100,000 in time and effort to investigate the spam and mollify unhappy customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There was a lot of interesting news about hackers and other cybercriminals, so let\u2019s see who has been busted in May.<\/p>\n","protected":false},"author":214,"featured_media":3469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[664,93,78,43,97],"class_list":{"0":"post-3468","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-busted","9":"tag-cybercriminals","10":"tag-hackers","11":"tag-privacy","12":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/busted-may-2014\/3468\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/busted-may-2014\/3573\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/busted-may-2014\/3901\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/busted-may-2014\/4105\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/busted-may-2014\/4250\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/busted-may-2014\/5029\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/busted-may-2014\/3885\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/busted-may-2014\/4250\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/busted-may-2014\/5029\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/busted-may-2014\/5029\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/busted\/","name":"Busted"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3468"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3468\/revisions"}],"predecessor-version":[{"id":7000,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3468\/revisions\/7000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3469"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}