Attacks/Breaches

9/10/2018
11:30 AM
50%
50%

Russian National Extradited for 2014 JP Morgan Hack

Andrei Tyurin was arrested for his involvement in a hacking campaign targeting US financial institutions, financial news publishers, brokerage firm, and other companies.

Georgian officials have extradited Russian citizen Andrei Tyurin to the United States, where he will face charges related to a wide-ranging hacking campaign that targeted the US financial sector and included the 2014 breach of JP Morgan Chase. 

The Manhattan US Attorney's office announced Friday that Tyurin was arrested by authorities in the country of Georgia at the request of the United States for his participation in hacking US financial organizations, brokerage firms, financial news publishers, and other companies. From 2012 to mid-2015, the campaign stole personal information of more than 100 million customers of target organizations. The breach at JP Morgan Chase was the largest theft of customer data from any single US financial institution in history with more than 80 million people affected.

In addition to attacks targeting US financial firms, Tyurin allegedly also launched cyberattacks on US and foreign companies at the direction of Gery Shalon, one of many co-conspirators he allegedly worked with. Their other activities included illegal Internet gambling businesses and international payment processors, and collectively generated hundreds of millions of dollars in illicit earnings.

Tyurin is charged with one count of conspiracy to commit computer hacking, one count of wire fraud, four counts of computer hacking, one count of conspiracy to commit securities fraud, one count of conspiracy to violate the Unlawful Internet Gambling Enforcement Act, one count of conspiracy to commit wire fraud and bank fraud, and aggravated identity theft.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3829
PUBLISHED: 2018-09-19
In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 it was discovered that a user could scale out allocators on new hosts with an invalid roles token. An attacker with access to the previous runner ID and IP address of the coordinator-host could add a allocator to an existing ECE install to ga...
CVE-2018-3830
PUBLISHED: 2018-09-19
Kibana versions 5.3.0 to 6.4.1 had a cross-site scripting (XSS) vulnerability via the source field formatter that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
CVE-2018-3831
PUBLISHED: 2018-09-19
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This c...
CVE-2018-3823
PUBLISHED: 2018-09-19
X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. Users with manage_ml permissions could create jobs containing malicious data as part of their configuration that could allow the attacker to obtain sensitive information from or perform destructiv...
CVE-2018-3824
PUBLISHED: 2018-09-19
X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. If an attacker is able to inject data into an index that has a ML job running against it, then when another user views the results of the ML job it could allow the attacker to obtain sensitive inf...