Attacks/Breaches
8/12/2010
02:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Alleged International ID Theft Ringleader Arrested

Russian "BadB" considered one of the most "prolific" brokers of stolen credit card information

French authorities operating with the U.S. Secret Service have arrested a Russian man allegedly behind one of the world's largest online credit-card trafficking operations.

Vladislav Anatolievich Horohorin, 27, was apprehended over the weekend as he was about to board a flight from Nice, France. to Moscow. Horohorin, a.k.a "BadB," had been indicted by a federal grand jury in November 2009 on charges of access device fraud and aggravated identity theft. The U.S. Department of Justice unsealed the indictment yesterday, referring to Horohorin as potentially one of the most prolific sellers of pilfered card information in the world.

Horohorin allegedly helped create CarderPlanet and other sites as part of an online financial crime organization that has been linked to most financial information breaches reported around the world, according to federal officials. "This network has been repeatedly linked to nearly every major intrusion of financial information reported to the international law enforcement community," said Michael Merritt, assistant director for investigations for the U.S. Secret Service. "This arrest is an illustration of the success that comes from international law enforcement and private sector partnerships and confirms the Secret Service commitment to traversing the globe in pursuit of online criminals."

The indictment alleges that Horohorin, a citizen of Israel and the Ukraine, used the handle"BadB" to sell stolen credit card information on online forums, including CarderPlanet and carder.su. Buyers then would create accounts at another website operated by Horohorin, called "dumps.name," where they would pay for the stolen credit-card data. The buyers were directed to use "Webmoney," an online currency service hosted in Russia, to pay for the stolen goods.

Horohorin was caught after the U.S. Secret Service conducted an undercover investigation of his activities, including posing as sellers of stolen credit-card dumps. He is currently being held in France pending his extradition to the U.S., where he faces a maximum of 10 years in prison and a $250,000 fine for access device fraud. He also faces one count of aggravated identity theft, which could put him in prison for two years and cost him $250,000 in fines.

"Computer hackers and identity thieves threaten the security of millions of innocent Americans with their crimes. These criminals are mistaken to think that they can escape detection by committing their crimes behind a computer screen in a foreign country," said U.S. Attorney Ronald C. Machen Jr. for the District of Columbia. "The arrest and prosecution of Mr. Horohorin demonstrates that we will identify, apprehend, and bring to justice in the United States even the most sophisticated international computer hackers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web