Attacks/Breaches
8/12/2010
02:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Alleged International ID Theft Ringleader Arrested

Russian "BadB" considered one of the most "prolific" brokers of stolen credit card information

French authorities operating with the U.S. Secret Service have arrested a Russian man allegedly behind one of the world's largest online credit-card trafficking operations.

Vladislav Anatolievich Horohorin, 27, was apprehended over the weekend as he was about to board a flight from Nice, France. to Moscow. Horohorin, a.k.a "BadB," had been indicted by a federal grand jury in November 2009 on charges of access device fraud and aggravated identity theft. The U.S. Department of Justice unsealed the indictment yesterday, referring to Horohorin as potentially one of the most prolific sellers of pilfered card information in the world.

Horohorin allegedly helped create CarderPlanet and other sites as part of an online financial crime organization that has been linked to most financial information breaches reported around the world, according to federal officials. "This network has been repeatedly linked to nearly every major intrusion of financial information reported to the international law enforcement community," said Michael Merritt, assistant director for investigations for the U.S. Secret Service. "This arrest is an illustration of the success that comes from international law enforcement and private sector partnerships and confirms the Secret Service commitment to traversing the globe in pursuit of online criminals."

The indictment alleges that Horohorin, a citizen of Israel and the Ukraine, used the handle"BadB" to sell stolen credit card information on online forums, including CarderPlanet and carder.su. Buyers then would create accounts at another website operated by Horohorin, called "dumps.name," where they would pay for the stolen credit-card data. The buyers were directed to use "Webmoney," an online currency service hosted in Russia, to pay for the stolen goods.

Horohorin was caught after the U.S. Secret Service conducted an undercover investigation of his activities, including posing as sellers of stolen credit-card dumps. He is currently being held in France pending his extradition to the U.S., where he faces a maximum of 10 years in prison and a $250,000 fine for access device fraud. He also faces one count of aggravated identity theft, which could put him in prison for two years and cost him $250,000 in fines.

"Computer hackers and identity thieves threaten the security of millions of innocent Americans with their crimes. These criminals are mistaken to think that they can escape detection by committing their crimes behind a computer screen in a foreign country," said U.S. Attorney Ronald C. Machen Jr. for the District of Columbia. "The arrest and prosecution of Mr. Horohorin demonstrates that we will identify, apprehend, and bring to justice in the United States even the most sophisticated international computer hackers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web