Showing posts with label CYBERCRIME RING. Show all posts
Showing posts with label CYBERCRIME RING. Show all posts

Monday, April 13, 2015

CYBERCRIME RING MEMBER RECEIVES 150 MONTH PRISON TERM

FROM:  U.S. JUSTICE DEPARTMENT
Thursday, April 9, 2015
Member of Organized Cybercrime Ring Sentenced to 150 Months in Prison for Selling Stolen and Counterfeit Credit Cards

A member of the identity theft and credit card fraud ring known as “Carder.su” was sentenced today to 150 months in federal prison for selling stolen and counterfeit credit cards over the Internet.  He was further ordered to pay $50.8 million in restitution.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Daniel G. Bogden of the District of Nevada and Assistant Special Agent in Charge Michael Harris of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations’ (ICE-HSI) Las Vegas Field Office made the announcement.  U.S. District Judge Andrew P. Gordon of the District of Nevada imposed the sentence.

“Criminal cyber organizations like Carder.su threaten not just U.S. citizens but people in every corner of the globe,” said Assistant Attorney General Caldwell.  “Managers in Russia seamlessly ran their criminal enterprise online using, among others, a counterfeit card vendor from New Jersey, with whom they communicated through screen name aliases.  The success in this case was achieved through equally seamless cooperation with our foreign law enforcement partners and effective use of the RICO statute.  As more countries work with us to fight these organizations, we will continue to evolve to meet this growing threat.”

“Mr. Smith’s crimes were very serious and justify a lengthy prison sentence,” said U.S. Attorney Bogden.  “He admitted that he caused a loss of seven to $20 million involving over 250 victims, and that he obstructed justice when he fled to Jamaica while released on bond awaiting trial.  We are working closely with our international, federal, state and local law enforcement partners to make sure that the perpetrators of these sorts of crimes are prosecuted no matter where in the world they commit their crimes or attempt to flee.”

“As this sentence demonstrates, cyber-criminals who purposely harm innocent Americans and compromise our financial system and global commerce will be aggressively pursued, investigated and prosecuted,” said Assistant Special Agent in Charge Harris.  “These criminals may believe they can escape detection by fleeing the country and hiding behind their computer screens, but as this case shows, cyberspace is not a refuge from justice.”

Jermaine Smith, aka “SirCharlie57,” aka “Fairbusinessman,” 34, of East Orange, New Jersey, pleaded guilty in October 2014 to one count of participating in a racketeer influenced corrupt organization.  

During his guilty plea, Smith admitted that in May 2009 he became associated with the Carder.su organization, a criminal enterprise whose members trafficked in compromised credit card account data and counterfeit identifications, and committed money laundering, narcotics trafficking, and various types of computer crime.  Specifically, Smith admitted that he operated as a vendor on the organization’s websites, using the “SirCharlie57” and “Fairbusinessman” nicknames.  While acting as a vendor under those online monikers, Smith sold counterfeit credit cards to an undercover special agent.  Those counterfeit credit cards were successfully processed for fingerprints, identifying Smith as the true user of the online screennames.  In addition to the sale of the counterfeit credit cards, Smith admitted that he possessed over 2,150 stolen credit and debit card account numbers.

While on pretrial release in this case, Smith removed an electronic monitoring device from his person and fled to Jamaica.  He was arrested four months later and returned to Nevada.

Fifty-six individuals were charged in four separate indictments in Operation Open Market, which targeted the Carder.su organization.  To date, 26 individuals have been convicted and the rest are either fugitives or are pending trial.  

The cases were investigated by ICE-HSI and the U.S. Secret Service, and are being prosecuted by Trial Attorney Jonathan Ophardt of the Criminal Division’s Organized Crime and Gang Section and Assistant U.S. Attorneys Kimberly M. Frayn and Andrew W. Duncan of the District of Nevada.

This prosecution is in connection with the President’s Financial Fraud Enforcement Task Force.  The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes.

Sunday, December 16, 2012

THE "SCAREWARE" INFECTION CRIME

Credit:  U.S. GSA
FROM: U.S. DEPARTMENT OF JUSTICE

Friday, December 14, 2012
Payment Processor for Scareware Cybercrime Ring Sentenced to 48 Months in Prison


WASHINGTON – A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting victims’ computers with "scareware" and selling rogue antivirus software that was supposed to secure victims’ computers but was, in fact, useless, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney for the Western District of Washington Jenny A. Durkan and Special Agent in Charge Laura M. Laughlin of the FBI Seattle Division.

Mikael Patrick Sallnert, 37, a citizen of Sweden, was sentenced by Chief U.S. District Judge Marsha J. Pechman in the Western District of Washington. In addition to his prison term, Sallnert was ordered to pay $650,000 in forfeiture.

"Mikael Patrick Sallnert played an instrumental role in carrying out a massive cybercrime ring that victimized approximately 960,000 innocent victims," said Assistant Attorney General Breuer. "By facilitating payment processing, Sallnert allowed the cybercrime ring to collect millions of dollars from victims who were duped into believing their computers were compromised and could be fixed by the bogus software created by Sallnert’s co-conspirators. Cybercrime poses a real threat to American consumers and businesses, and the Justice Department is committed to pursuing cybercriminals across the globe."

"Payment processors like this defendant are the backbone of the cybercrime underworld," said U.S. Attorney Durkan. "As an established businessman, this defendant put a stamp of legitimacy on cyber criminals. He was involved in defrauding thousands of victims, and his actions contributed to insecurities in e-commerce that stifle the development of legitimate enterprises and increase the costs of e-commerce for everyone."

"Partnerships are central to the FBI in accomplishing its mission," said Special Agent in Charge Laughlin. "This cyber crime ring spanned multiple countries—increasing the threat it posed and complicating the necessary law enforcement response. Thanks to the commitment of many foreign partners and FBI entities across the nation, we were able to dismantle that threat and ensure Mr. Sallnert faced justice. The FBI and its partners will continue to work tirelessly until we bring in the remaining perpetrators of this malicious scheme."

Sallnert was arrested in Denmark on Jan. 19, 2012, and extradited to the United States in March 2012. He pleaded guilty on Aug. 17, 2012, to one count of conspiracy to commit wire fraud and one count of accessing a protected computer in furtherance of fraud.

The prosecution of Sallnert is part of Operation Trident Tribunal, an ongoing, coordinated enforcement action targeting international cybercrime. The operation targeted international cybercrime rings that caused more than $71 million in total losses to more than one million computer users through the sale of fraudulent computer security software known as "scareware." Scareware is malicious software that poses as legitimate computer security software and purports to detect a variety of threats on the affected computer that do not actually exist. Users are then informed they must purchase what they are told is anti-virus software in order to repair their computers. The users are then barraged with aggressive and disruptive notifications until they supply their credit card number and pay for the "anti-virus" product, which is, in fact, fake.

The scareware scheme used a variety of ruses to trick consumers into unknowingly infecting their computers with the malicious scareware products, including web pages featuring fake computer scans. Once the scareware was downloaded, victims were notified that their computers were infected with a range of malicious software, such as viruses and Trojans and badgered into purchasing the fake antivirus software to resolve the non-existent problem at a cost of up to $129. An estimated 960,000 users were victimized by this scareware scheme, leading to $71 million in actual losses.

According to Sallnert’s plea agreement, he agreed to establish and operate credit card payment processing services for the scareware ring, knowing that his co-conspirators were intentionally causing fake and fraudulent messages to display on victims’ computers that would fraudulently induce the victims into purchasing the rogue security software. According to court documents, between approximately August 2008 and October 2009, the payment processing mechanisms established by Sallnert processed approximately $5 million in credit card payments on behalf of the scheme.

This case is being investigated by the FBI Seattle Division Cyber Task Force and other FBI entities. The case is being prosecuted by Trial Attorneys Carol Sipperly and Ethan Arenson of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorneys Norman Barbosa and Kathryn Warma of the Western District of Washington. Substantial assistance was provided by the Criminal Division’s Office of International Affairs.

Critical assistance in the prosecution was provided by the Security Service of Ukraine, German Federal Criminal Police, Netherlands National High-Tech Crime Unit, London Metropolitan Police, Latvian State Police, Lithuanian Criminal Police Bureau, Swedish National Police Cyber Unit, French Police Judiciare, Royal Canadian Mounted Police, Romania’s Directorate for Combating Organized Crime, Cyprus National Police in cooperation with the Unit for Combating Money Laundering and the Danish National Police.

To avoid falling victim to a scareware scheme, computer users should avoid purchasing computer security products that use unsolicited "free computer scans" to sell their products. It is also important for users to protect their computers by maintaining an updated operating system and using legitimate, up-to-date antivirus software, which can detect and remove fraudulent scareware products.

Additional tips on how to spot a scareware scam include:

• Scareware advertising is difficult to dismiss. Scareware purveyors employ aggressive techniques and badger users with pop-up messages into purchasing their products. These fake alerts are often difficult to close and quickly reappear.

• Fake anti-virus products are designed to appear legitimate and can use names such as Virus Shield, Antivirus or VirusRemover. Only install software from trusted sources that you seek out. Internet service providers often make name-brand anti-virus products available to their customers for free.

• Become familiar with the brand, look and functionality of the legitimate anti-virus software that is installed on your computer. This will assist you in identifying scareware.

Computer users who think they have been victimized by scareware should file a complaint with the FBI’s Internet Crime Complaint Center,
www.ic3.gov.

Search This Blog

Translate

White House.gov Press Office Feed