Attacks/Breaches
8/12/2010
02:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Alleged International ID Theft Ringleader Arrested

Russian "BadB" considered one of the most "prolific" brokers of stolen credit card information

French authorities operating with the U.S. Secret Service have arrested a Russian man allegedly behind one of the world's largest online credit-card trafficking operations.

Vladislav Anatolievich Horohorin, 27, was apprehended over the weekend as he was about to board a flight from Nice, France. to Moscow. Horohorin, a.k.a "BadB," had been indicted by a federal grand jury in November 2009 on charges of access device fraud and aggravated identity theft. The U.S. Department of Justice unsealed the indictment yesterday, referring to Horohorin as potentially one of the most prolific sellers of pilfered card information in the world.

Horohorin allegedly helped create CarderPlanet and other sites as part of an online financial crime organization that has been linked to most financial information breaches reported around the world, according to federal officials. "This network has been repeatedly linked to nearly every major intrusion of financial information reported to the international law enforcement community," said Michael Merritt, assistant director for investigations for the U.S. Secret Service. "This arrest is an illustration of the success that comes from international law enforcement and private sector partnerships and confirms the Secret Service commitment to traversing the globe in pursuit of online criminals."

The indictment alleges that Horohorin, a citizen of Israel and the Ukraine, used the handle"BadB" to sell stolen credit card information on online forums, including CarderPlanet and carder.su. Buyers then would create accounts at another website operated by Horohorin, called "dumps.name," where they would pay for the stolen credit-card data. The buyers were directed to use "Webmoney," an online currency service hosted in Russia, to pay for the stolen goods.

Horohorin was caught after the U.S. Secret Service conducted an undercover investigation of his activities, including posing as sellers of stolen credit-card dumps. He is currently being held in France pending his extradition to the U.S., where he faces a maximum of 10 years in prison and a $250,000 fine for access device fraud. He also faces one count of aggravated identity theft, which could put him in prison for two years and cost him $250,000 in fines.

"Computer hackers and identity thieves threaten the security of millions of innocent Americans with their crimes. These criminals are mistaken to think that they can escape detection by committing their crimes behind a computer screen in a foreign country," said U.S. Attorney Ronald C. Machen Jr. for the District of Columbia. "The arrest and prosecution of Mr. Horohorin demonstrates that we will identify, apprehend, and bring to justice in the United States even the most sophisticated international computer hackers."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.