Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

Grand Jury Busts 17 in Internet Crime Ring

Two-year investigation uncovers 95,000 stolen credit cards and more than $4 million in fraud

Chalk up one for the good guys: A New York grand jury has indicted 17 people and a corporation on charges of identity theft, worldwide trafficking in stolen credit card numbers, and other crimes committed using the Internet.

The 173-count indictment, which resulted from the second phase of a two-year investigation, says the defendants trafficked in more than 95,000 stolen credit card numbers and caused more than $4 million in credit card fraud, according to an Associated Press report.

The defendants ran Internet ads saying they had countless credit card numbers and other identifying information to sell to crooks, according to Manhattan Assistant District Attorney John Bandler. One of their Websites was subtly titled "The International Association for the Advancement of Criminal Activity."

Two of the defendants are a married couple, Vadim Vassilenko, 40, and Yelena Barysheva, 42, who pleaded guilty in September 2006 to falsifying business records and violating New York banking law by running an unlicensed check cashing and money transfer business.

Vassilenko, born in Ukraine, was sentenced at the time to two to six years in prison, and Barysheva, born in Russia, was sentenced to one to three years. Their son, Alexey Baryshev, is being sought, prosecutors said.

The latest indictment charges that Vassilenko, Barysheva, and several other people, who were arrested in four states, moved more than $35 million in suspect funds through their service, Western Express International. Bandler said the defendants provided money transfer and currency exchange services.

Defense lawyer Daniel Gotlin called the new charges against Vassilenko and Barysheva pointless and repetitive, saying many were the same as those charged in 2006. He also said prosecutors were being vindictive because they were disappointed with Vassilenko's and Barysheva's sentences.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9268
PUBLISHED: 2020-02-18
SoPlanning 1.45 is vulnerable to SQL Injection in the OrderBy clause, as demonstrated by the projets.php?order=nom_createur&by= substring.
CVE-2020-9269
PUBLISHED: 2020-02-18
SOPlanning 1.45 is vulnerable to authenticated SQL Injection that leads to command execution via the users parameter, as demonstrated by export_ical.php.
CVE-2020-9270
PUBLISHED: 2020-02-18
ICE Hrm 26.2.0 is vulnerable to CSRF that leads to password reset via service.php.
CVE-2020-9271
PUBLISHED: 2020-02-18
ICE Hrm 26.2.0 is vulnerable to CSRF that leads to user creation via service.php.
CVE-2020-9265
PUBLISHED: 2020-02-18
phpMyChat-Plus 1.98 is vulnerable to multiple SQL injections against the deluser.php Delete User functionality, as demonstrated by pmc_username.