Attacks/Breaches
4/21/2017
07:15 PM
50%
50%

Russian Citizen Gets Record 27-Year Sentence for Hacking, Fraud Scheme

Roman Valeryevich gets 27 years for hacking PoS machines. Meanwhile, spam master Pyotr Levashov's indictment is unsealed.

A 32-year-old Russian citizen was sentenced today to 27 years in prison for a hacking and credit card fraud scheme that caused more than $169 million in damage to small businesses and financial organizations, the Department of Justice reports. It is the longest sentence given by the US judicial system for cybercrime offenses, to date.  

Roman Valeryevich Seleznev, also known as "Track2," of Vladivostok was convicted in August 2016 of 38 counts related to his operation of hacking into point-of-sale computers to steal credit card information and sell it on the dark web. According to evidence, he stole milions of credit card numbers from over 500 organizations, many of them small businesses, sold them on carding markets, and caused losses to approximately 3,700 financial institutions over his four-year scheme.

"This investigation, conviction and sentence demonstrates that the United States will bring the full force of the American justice system upon cybercriminals like Seleznev who victimize U.S. citizens and companies from afar," said Acting Assistant Attorney General Blanco.

Read more details here.

Alleged Kelihos Operator Indicted

In related news, the Department of Justice released more information about the specific indictment against Pyotr Yuryevick Levashov, who was arrested April 10 as part of a large effort to take down the Kelihos botnet, which Dark Reading reported on last week.

Kelihos was used to send hundreds of millions of fraudulent emails per year, harvest login credentials, distribute ransomware and banking Trojans, and send spam used in pump-and-dump schemes. There is also speculation that it had connections to US election tampering.

Levashov, 36 (aka Petr Levashov, Peter Severa, Petr Severa and Sergey Astakhov) of St. Petersburg, Russia, was charged in an 8-count indictment, including intentional damage to a protected computer, one count of conspiracy, one count of accessing protected computers in furtherance of fraud, one count of wire fraud, one count of threatening to damage a protected computer, two counts of fraud in connection with email and one count of aggravated identity theft.

Levashov was arrested in Barcelona by Spanish authorities April 7, after an arrest warrant was issued in March, and has been detained ever since. The US is seeking his extradition.

Alleged Click-fraud Schemer Extradited

The US successfully did secure the extradition of a different alleged cybercriminal, the Department of Justice announced today.

Italian citizen Fabio Gasperini, an IT professional based in Rome, has been charged with computer intrusion, wire fraud conspiracy, wire fraud, and money laundering conspiracy in relation to allegations of his creation of a global botnet and involvement in a click-fraud scheme.

He was arrested in Amsterdam in June and extradited Thursday.

 

Related Content:

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.