Our mission is to comfort the afflicted and afflict the status quo. Independent journalism with a focus on politics and satire, public safety, judicial misconduct, government corruption, HOA/CID, senior advocacy, sanctity of life & marriage and a voice to the voiceless
Pages
- Home
- QTRAX Classic
- Parasites
- Elder Abuse
- TCBJ Data Mining Tools
- Prison Reform- Mental Health
- Suggested Christian Businesses
- Public Safety
- Letters to the Editor
- For the Birds
- Public Education
- Judicial Misconduct Tracker
- HOA Legal Resources
- Other HOA Sites
- Advertise
- HOA Advocate D. Vanitzian
- The American Divide
- CDN
Friday, April 11, 2014
Nine Charged in Conspiracy to Steal Millions of Dollars Using Zeus Malware
Posted by CotoBlogzz
Rancho Santa a Margarita, CA - Nine alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as “Zeus” have been charged in an indictment unsealed today in Lincoln, Nebraska, according to Acting Assistant Attorney General David A. O’Neil of the Justice Department’s Criminal Division, U.S. Attorney Deborah R. Gilg for the District of Nebraska and Special Agent in Charge Thomas R. Metz of the FBI’s Omaha Division.
The indictment was unsealed in connection with the arraignment this afternoon at the federal courthouse in Lincoln of two Ukrainian nationals, Yuriy Konovalenko, 31, and Yevhen Kulibaba, 36. Konovalenko and Kulibaba were recently extradited from the United Kingdom. All of the defendants were charged by a federal grand jury in August 2012 with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud.
According to the indictment, the defendants participated in an enterprise and scheme that installed, without authorization, malicious software known as “Zeus” or “Zbot” on victims’ computers. The defendants are charged with using that malicious software to capture bank account numbers, passwords, personal identification numbers, RSA SecureID token codes and similar information necessary to log into online banking accounts. The indictment alleges that the defendants falsely represented to banks that they were employees of the victims and authorized to make transfers of funds from the victims’ bank accounts, causing the banks to make unauthorized transfers of funds from the victims’ accounts.
As part of the enterprise and scheme, the defendants allegedly used as “money mules” residents of the United States who received funds transferred over the Automated Clearing House network or through other interstate wire systems from victims’ bank accounts into the money mules’ own bank accounts. These “money mules” then allegedly withdrew some of those funds and wired the money overseas to conspirators.
According to court documents unsealed today, Kulibaba allegedly operated the conspirators’ money laundering network in the United Kingdom by providing money mules and their associated banking credentials to launder the money withdrawn from U.S.-based victim accounts. Konovalenko allegedly provided money mules’ and victims’ banking credentials to Kulibaba and facilitated the collection of victims’ data from other conspirators.
The following four identified defendants remain at large:
• Vyacheslav Igorevich Penchukov, 32, of Ukraine, who allegedly coordinated the exchange of stolen banking credentials and money mules and received alerts once a bank account had been compromised.
• Ivan Viktorvich Klepikov, 30, of Ukraine, the alleged systems administrator who handled the technical aspects of the criminal scheme and also received alerts once a bank account had been compromised.
• Alexey Dmitrievich Bron, 26, of Ukraine, the alleged financial manager of the criminal operations who managed the transfer of money through an online money system known as Webmoney.
• Alexey Tikonov, of Russia, an alleged coder or developer who assisted the criminal enterprise by developing new codes to compromise banking systems.
The indictment also charges three other individuals as John Doe #1, John Doe #2 and John Doe #3.
The case was investigated by the FBI’s Omaha Cyber Task Force. The Metropolitan Police Service of the United Kingdom, the National Police of the Netherlands’s National High Tech Crime Unit and the Security Service of Ukraine provided significant assistance in the investigation.
The case is being prosecuted by Trial Attorney William A. Hall, Jr. of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Steven A. Russell of the District of Nebraska. The Office of International Affairs in the Justice Department’s Criminal Division provided valuable assistance with the extradition.
“The ‘Zeus’ malware is one of the most damaging pieces of financial malware that has ever been used,” said Acting Assistant Attorney General O’Neil.
“In this case, the victims included a Nebraska bank and a Nebraska company,” said U.S. Attorney Gilg. “This demonstrates the global reach of cybercrime and the significant threat to our financial infrastructure. We are grateful for the collaboration of our international and federal law enforcement partners in this complex financial fraud crime."
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment