Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/2/2015
12:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former Liberty Reserve IT Manager Sentenced to 36 Months in Prison

The former information technology manager for Liberty Reserve was sentenced for conspiring to operate an unlicensed money transmitting business.

Department of Justice, Office of Public Affairs -- The former information technology manager for Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, was sentenced today to 36 months in prison for conspiring to operate an unlicensed money transmitting business.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Preet Bharara of the Southern District of New York made the announcement.

Maxim Chukharev, 28, of San José, Costa Rica, pleaded guilty in September 2014 before U.S. District Judge Denise L. Cote, who also imposed today’s sentence.

According to allegations contained in the indictment and statements made in related court proceedings, Chukharev was an associate of Liberty Reserve founder Arthur Budovsky and served as Liberty Reserve’s information technology manager in Costa Rica. In that role, Chukharev was principally responsible, along with co-defendant Mark Marmilev, formerly Liberty Reserve’s chief technology officer, for maintaining Liberty Reserve’s technological infrastructure.

According to allegations in the indictment and statements made in related court proceedings, Liberty Reserve was incorporated in Costa Rica in 2006 and billed itself as the Internet’s “largest payment processor and money transfer system.” Liberty Reserve was created, structured and operated to help users conduct illegal transactions anonymously and launder the proceeds of their crimes, and it emerged as one of the principal money transfer agents used by cybercriminals around the world to distribute, store and launder the proceeds of illegal activity. Liberty Reserve was used extensively for illegal purposes, functioning as the bank of choice for the criminal underworld because it provided an infrastructure that enabled cybercriminals around the world to conduct anonymous and untraceable financial transactions.

According to court records, before being shut down by the government in May 2013, Liberty Reserve had more than one million users worldwide, including more than 200,000 users in the United States, who conducted approximately 55 million transactions through its system totaling more than $6 billion in funds. These funds encompassed suspected proceeds of credit card fraud, identity theft, investment fraud, computer hacking, child pornography, narcotics trafficking and other crimes.

Chukharev, Marmilev and Budovsky were among seven individuals charged in the indictment, which was unsealed on May 28, 2013. Three co-defendants—Marmilev, Vladimir Kats and Azzeddine El Amine—previously pleaded guilty. Marmilev was sentenced to five years in prison in December 2014; Kats and El Amine await sentencing. The indictment also charged Liberty Reserve with conspiracy to commit money laundering and operation of an unlicensed money transmitting business, and the charges remain pending.

The charges contained in the indictment are merely accusations. The defendants are presumed innocent unless and until proven guilty.

This case is being investigated by the U.S. Secret Service, the Internal Revenue Service-Criminal Investigation and the U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, with assistance from the Secret Service’s New York Electronic Crimes Task Force. The Judicial Investigation Organization in Costa Rica, the National High Tech Crime Unit in the Netherlands, the Financial and Economic Crime Unit of the Spanish National Police, the Cyber Crime Unit at the Swedish National Bureau of Investigation and the Swiss Federal Prosecutor’s Office also provided assistance.

This case is being prosecuted jointly by the Criminal Division’s Asset Forfeiture and Money Laundering Section (AFMLS) and the U.S. Attorney’s Office’s Complex Frauds Unit and Asset Forfeiture Unit in the Southern District of New York, with assistance from the Criminal Division’s Office of International Affairs and Computer Crime and Intellectual Property Section.

Trial Attorney Kevin Mosley of AFMLS and Assistant U.S. Attorneys Serrin Turner, Andrew Goldstein and Christine Magdo of the Southern District of New York are in charge of the prosecution, and Assistant U.S. Attorney Christine Magdo is in charge of the forfeiture aspects of the case.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...