Attacks/Breaches
8/12/2010
02:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Alleged International ID Theft Ringleader Arrested

Russian "BadB" considered one of the most "prolific" brokers of stolen credit card information

French authorities operating with the U.S. Secret Service have arrested a Russian man allegedly behind one of the world's largest online credit-card trafficking operations.

Vladislav Anatolievich Horohorin, 27, was apprehended over the weekend as he was about to board a flight from Nice, France. to Moscow. Horohorin, a.k.a "BadB," had been indicted by a federal grand jury in November 2009 on charges of access device fraud and aggravated identity theft. The U.S. Department of Justice unsealed the indictment yesterday, referring to Horohorin as potentially one of the most prolific sellers of pilfered card information in the world.

Horohorin allegedly helped create CarderPlanet and other sites as part of an online financial crime organization that has been linked to most financial information breaches reported around the world, according to federal officials. "This network has been repeatedly linked to nearly every major intrusion of financial information reported to the international law enforcement community," said Michael Merritt, assistant director for investigations for the U.S. Secret Service. "This arrest is an illustration of the success that comes from international law enforcement and private sector partnerships and confirms the Secret Service commitment to traversing the globe in pursuit of online criminals."

The indictment alleges that Horohorin, a citizen of Israel and the Ukraine, used the handle"BadB" to sell stolen credit card information on online forums, including CarderPlanet and carder.su. Buyers then would create accounts at another website operated by Horohorin, called "dumps.name," where they would pay for the stolen credit-card data. The buyers were directed to use "Webmoney," an online currency service hosted in Russia, to pay for the stolen goods.

Horohorin was caught after the U.S. Secret Service conducted an undercover investigation of his activities, including posing as sellers of stolen credit-card dumps. He is currently being held in France pending his extradition to the U.S., where he faces a maximum of 10 years in prison and a $250,000 fine for access device fraud. He also faces one count of aggravated identity theft, which could put him in prison for two years and cost him $250,000 in fines.

"Computer hackers and identity thieves threaten the security of millions of innocent Americans with their crimes. These criminals are mistaken to think that they can escape detection by committing their crimes behind a computer screen in a foreign country," said U.S. Attorney Ronald C. Machen Jr. for the District of Columbia. "The arrest and prosecution of Mr. Horohorin demonstrates that we will identify, apprehend, and bring to justice in the United States even the most sophisticated international computer hackers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio