backtop


Print 20 comment(s) - last by Visual.. on Jul 31 at 9:48 AM


  (Source: France24)
Group stole 160 million credit cards and over hundreds of millions in criminal loot

The U.S. Department of Justice (DOJ) today unsealed an indictment against four Russians and a Ukranian who stand accused of orchestrating the most ambitious hacking crime in history in financial terms.

I. The Crime

The group is tied to Albert Gonzalez, who at times served as their alleged ringleader.  Mr. Gonzalez was a Florida area hacker, infamous for living large and at one point burying $1M USD in his backyard.  He's currently serving a 20-year federal prison sentence.

The hacks in question began in 2005 and continued through 2007.  The ring was first busted back in 2008, at which point two of the individuals were charged unnamed as "Hacker 1" and "Hacker 2" (as they were outside the U.S. and assumed unable to be extradited).

Now the investigation has wrapped up and names have been put to those hackers, as well as three others who participated in related attacks.  The hacking scheme allegedly nabbed 160 million credit card numbers -- most of them from a hack of Heartland Payment Systems, Inc. (HPY) which nabbed 130 million cards.

The attacks were highly sophisticated, but often started with a relatively unskilled technique -- SQL injection.  Once access was gained to corporate servers, malware was installed, including so-called "back door" software, which is designed to keep an open access link to the attacker's servers.  Corporations in some cases detected the attacks, according to the indictment, but were often penetrated a second time or more due to the surprisingly "persistent" and diverse array of attacks used by the defendants.

Credit Cards
Using sniffers, malware, SQL injection scripts, and a "persistent" attack level, a ring of five Russian hackers, plus imprisoned U.S. hacker Albert Gonzalez, scored 160 million credit cards. [Image Source: France24]

The more sophisticated side of the attacks also included installing malware on individuals' PCs worldwide to create a botnet, which acted as distributed storage for the stolen information from the corporate-level attacks.  It is unclear what virus/malware the suspects used, but the indictment does indicate they also installed sniffers on affected machines to offer yet another route to stealing credit card numbers and personal information.

II. The Victims

The going rates charged by the suspects per stolen credit card (CC) number (with associated data) was:
  • American CC: $10 USD
  • Canadian CC: $15 USD
  • European CC: $50 USD
Those who purchased the card information actively used it to then steal money from the affected individuals and institutions.  The indictment describes, "Ultimately, the end users encoded each dump onto the magnetic strip of a blank plastic card and cashed out the value of the dump by either withdrawing money from ATMs or making purchases with the cards."

U.S. Attorney Paul Fishman
U.S. Attorney Paul Fishman announces the charges at a special press conference.
[Image Source: AP]

The hacked financial and corporate entities include:
  • NASDAQ
  • 7-Eleven, Inc.
  • Carrefour SA (EPA:CA) (a French clothing retailer)
  • J.C. Penney Comp., Inc. (JCP)
  • Hannaford Bros. Comp.
  • Heartland Payment Systems
  • The Wet Seal, Inc. (WTSL)
  • Verifone Systems Inc.'s (PAY) Commidea
  • Dexia SA (ETR:DXB)
  • JetBlue Airways Corp. (JBLU)
  • Dow Jones
  • Euronet Worldwide, Inc. (EEFT)
  • Visa Inc.'s (V) Jordan subsidiary
  • Global Payments Inc. (GPN)
  • Diners Club Singapore
  • Ingenicard U.S. Inc.
The losses were huge, totalling $300M USD for just three of the above affected corporate entities alone.  The feds write:

As a result of the scheme, financial institutions, credit card companies and consumers suffered hundreds of millions in losses – including more than $300 million in losses reported by just three of the corporate victims – and immeasurable losses to the identity theft victims in costs associated with stolen identities and false charges.

II. The Suspects

Here's the suspects:
  • Vladimir Drinkman, 32, of Syktyykar and Moscow, Russia
    penetrated corporate networks ("Hacker 1")
     
  • Alexandr Kalinin, 26, of St. Petersburg, Russia,
    penetrated corporate networks ("Hacker 2")
     
  • Roman Kotov, 32, of Moscow
    Mined compromised networks for sensitive data
     
  • Mikhail Rytikov, 26, of Odessa, Ukraine
    Helped co-defendants hide tracks with anonymized web hosting and other services
     
  • Dmitriy Smilianets, 29, of Moscow
    Acted as sales person and accountant for illegal sales of the stolen credit card and personal info

...and the charges against them:

Count(s)

Defendants

Violation

Maximum Penalty/Count

1

All

Conspiracy to gain unauthorized access to computers (18 USC § 1030)

5 years; $250,000 fine or twice the gain or loss from the offense

2

All

Conspiracy to commit wire fraud (18 USC § 1343)

30 years; $1 million fine or twice the gain or loss from the offense

3-8

Drinkman
Kalinin
Kotov
Smilianets

Unauthorized access to computers(18 USC § 1030)

5 years; $250,000 fine or twice the gain or loss from the offense

9-11

Drinkman
Kalinin
Kotov
Smilianets

Wire fraud (18 USC § 1343)

30 years; $1 million fine or twice the gain or loss from the offense

 

Unfortunately, only Mr. Drinkman and Mr. Smilianets look likely to be extradited to the U.S. to stand trial.  That pair made the mistake of travelling to the Netherlands in 2012 on a vacation, where local authorities recognized and arrested them.  A person close to the case commented, "Here's the world's biggest hacker.  We got lucky."

Mr. Smilianets was already famous before the charges, having been a top professional gamer on the European and Russian circuits.  His attorney Bruce Provda contended to Reuters that the charges are false and that the extradition may be illegal.  He says he plans to fight "vigorously" for his client in court, remarking, "He was well known in certain [gaming] circles."

They are currently awaiting extradition.  The other three suspects, including Mr. Kalnin -- who along with Mr. Drinkman and Mr. Gonzalez -- orchestrated the attacks, remain at large.

The charges against the mostly Russian hacking ring follows a June 2013 indictment against an alleged 8-person Ukrainian hacking ring.  In that case, though, at least five of the suspects had immigrated to the U.S. and hence were able to be quickly nabbed.  That hacking ring was less sophisticated, compared to the Russians, and "only" managed to steal $15M USD.  The suspects in that case are currently awaiting trial.

Sources: DOJ [press release], Reuters



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: So how come...
By JasonMick (blog) on 7/26/2013 2:03:36 PM , Rating: 2
quote:
These five guys who stole 300 million from companies face potentially over 60 years in jail (but will probably get less) yet scumbags like John Corzine who made 1 billion dollars vanish... face zero time or chance of conviction?
They forgot to pay-off ...errr DONATE to Congress and their PACs. ;)

Want the law on your side? Buy off the people who make the laws and hire the people who enforce them!

Of course maybe our hacker friends know that.... After all, Russia pretty much has refused to deport the other hackers despite the fact that they likely stole hundreds of millions from the U.S.... as the U.S. prosecutors said "we go lucky" ... the only reason any of them got caught was that they went to the Netherlands and were stupidly posting vacation photos online, plus left their cell phone one allowing EU authorities to precisely locate and capture them.

Lesson learned?

If you're a rich criminal -- be it a Wall Street one or a Russia hacker multimillionaire -- stay in your own gang/mafia/cartel/gov't's jurisdiction, where your donations keep you safe. Otherwise you may be f**ked.


RE: So how come...
By MrBlastman on 7/26/2013 2:13:24 PM , Rating: 1
quote:
If you're a rich criminal -- be it a Wall Street one or a Russia hacker multimillionaire -- stay in your own gang/mafia/cartel/gov't's jurisdiction, where your donations keep you safe. Otherwise you may be f**ked.


Sadly this is true. As long as you know the right people in the right places (and paid out some money along the way), you can pretty much get away with almost anything these days.

Rule of law?

How about rule of joke.

It isn't entirely dead, yet, in the U.S. At least Zimmerman got off. That gives me a sliver of hope that justice still exists around here.

Otherwise, if you piss off someone who has already paid off the right people, you're screwed.


RE: So how come...
By dgingerich on 7/26/2013 3:05:46 PM , Rating: 2
I had jury duty where a bouncer was charged with assault when 4 drunk kids (I say 'kids' but they were in their early twenties, which is 'kid' status to me) started a fight in a club and got roughed up a little. They were whining because they got some scrapes and decided to sue the club. They decided to get someone charged criminally for assault in order to give more credibility to their civil case and blamed one particular bouncer for a bunch of things, of course off camera. The funny part was that the cameras directly showed this guy on camera standing back and watching the entire time, not touching anyone. His claim was that none of what the kids said happened.

They seemed to have wanted a fight as a group, and chose a gaming 'pull' technique to start it. (Funny how people don't actually follow the rules of video game opponents.) Three of them went outside and around a corner, while the fourth picked the biggest person in the club (who happened to be a pacifist) and punched him in the face, then ran outside. The big guy who got punched didn't follow, but instead went directly to the bouncers who pursued. Things went very badly for the stupid kids, overall, when two of them fell down while running away from the bouncers, being too drunk to run properly. So, once they got just out of camera view, the bouncers caught them and held them for the police to arrive. The kids made up all sorts of things that the bouncers supposedly did.

After declaring the bouncer not guilty for very obvious reasons, I advised the other bouncers, who were being civilly sued, and the club owner of the tactic they used to start the fight, and how best to defend against their suit. That suit was dropped shortly after that before even making it to court, I'm certain because of what I told them about the surveillance video and the 'pull' tactic they used.

Justice does come at times, but it takes people who pay attention, and most of the general populace isn't capable of seeing what's right in front of them.


RE: So how come...
By dgingerich on 7/26/2013 3:07:50 PM , Rating: 3
Oh, I forgot to mention that the 'kids' were sons of very politically prominent families in Colorado, so they got off scot-free. So, your case about staying in your area of protection is a good point.


RE: So how come...
By FITCamaro on 7/26/2013 4:44:11 PM , Rating: 2
Agreed on Zimmerman. Gotta love one of the members of the jury basically saying that she thought he was guilty but those pesky things called the facts got in the way. Of course the jury only saw less than half the facts.


"My sex life is pretty good" -- Steve Jobs' random musings during the 2010 D8 conference














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki