Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Nikita Kislitsin, formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. Experts say Kislitsin’s prosecution could soon put the Kazakhstan government in a sticky diplomatic position, as the Kremlin is already signaling that it intends to block his extradition to the United States. Continue reading Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

$10M Is Yours If You Can Get This Guy to Leave Russia

The U.S. government this week put a $10 million bounty on the head of a Russian man who for the past 18 years operated Try2Check, one of the cybercrime underground’s most trusted services for checking the validity of stolen credit card data. U.S. authorities say 43-year-old Denis Kulkov’s card-checking service made him at least $18 million, which he used to buy a Ferrari, Land Rover, and other luxury items. Continue reading $10M Is Yours If You Can Get This Guy to Leave Russia

Two Persons on the U.S Secret Service Most Wanted Cybercriminals List Run a Managed Android Malware Enterprise Including a Black Energy DDoS Botnet – An OSINT Analysis

Dear blog readers,This is Dancho. In this post I’ll provide actionable intelligence on two individuals on the U.S Secret Service’s Most Wanted Cybercriminals list in particular – Oleksandr Vitalyevich Ieremenko including Danil Potekhin f… Continue reading Two Persons on the U.S Secret Service Most Wanted Cybercriminals List Run a Managed Android Malware Enterprise Including a Black Energy DDoS Botnet – An OSINT Analysis

How Cyber Sleuths Cracked an ATM Shimmer Gang

In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to clone data from chip card transactions. Authorities in the United States and abroad had seized many of these shimmers, but for years couldn’t decrypt the data on the devices. This is a story of ingenuity and happenstance, and how one former Secret Service agent helped crack a code that revealed the contours of a global organized crime ring. Continue reading How Cyber Sleuths Cracked an ATM Shimmer Gang

Confessions of an ID Theft Kingpin, Part II

Yesterday’s piece told the tale of Hieu Minh Ngo, a hacker the U.S. Secret Service described as someone who caused more material financial harm to more Americans than any other convicted cybercriminal. Ngo was recently deported back to his home country after serving more than seven years in prison for running multiple identity theft services. He now says he wants to use his experience to convince other cybercriminals to use their skills for good. Here’s a look at what happened after he got busted. Continue reading Confessions of an ID Theft Kingpin, Part II

Confessions of an ID Theft Kingpin, Part I

At the height of his cybercriminal career, the hacker known as “Hieupc” was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world’s top data brokers. That is, until his greed and ambition played straight into an elaborate snare set by the U.S. Secret Service. Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Continue reading Confessions of an ID Theft Kingpin, Part I

Encoding Stolen Credit Card Data on Barcodes

Crooks are constantly dreaming up new ways to use and conceal stolen credit card data. According to the U.S. Secret Service, the latest scheme involves stolen card information embedded in barcodes affixed to phony money network rewards cards. The scammers then pay for merchandise by instructing a cashier to scan the barcode and enter the expiration date and card security code. Continue reading Encoding Stolen Credit Card Data on Barcodes

Aleksei Burkov, Russian accused of operating ‘elite’ hacking forum, pleads not guilty

The accused Russian scammer at center of a geopolitical standoff pleaded not guilty Friday to allegations that he operated two hacking forums where members bought and sold payment data worth roughly $20 million. Aleksei Burkov appeared in the Eastern District Court of Virginia to refute charges including computer intrusion, identity theft and other fraud-related accusations. The 29-year-old St. Petersburg native arrived in the U.S. on Nov. 12 from Israel after a prolonged extradition battle in which the Russian government tried coercing Israeli officials into sending Burkov to Russia, rather than the U.S. Burkov appeared relaxed to the point of laughing at a joke Judge Thomas Ellis made about his own penchant for eating ice cream in the former Soviet Union. The defendant wore a dark green jumpsuit and had short hair. Defense attorney Gregory Stambaugh said Burkov has been in good spirits, a mood the attorney described as “amazing” under the circumstances. […]

The post Aleksei Burkov, Russian accused of operating ‘elite’ hacking forum, pleads not guilty appeared first on CyberScoop.

Continue reading Aleksei Burkov, Russian accused of operating ‘elite’ hacking forum, pleads not guilty

Secret Service Investigates Breach at U.S. Govt IT Contractor

The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The contractor claims the access being auctioned off was to old test systems that do not have direct connections to its government partner networks.

In mid-August, a member of a popular Russian-language cybercrime forum offered to sell access to the internal network of a U.S. government IT contractor that does business with more than 20 federal agencies, including several branches of the military. The seller bragged that he had access to email correspondence and credentials needed to view databases of the client agencies, and set the opening price at six bitcoins (~USD $60,000). Continue reading Secret Service Investigates Breach at U.S. Govt IT Contractor

Meet Bluetana, the Scourge of Pump Skimmers

“Bluetana,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests. Data collected in the course of the investigation also reveals some fascinating details that may help explain why these pump skimmers are so lucrative and ubiquitous. Continue reading Meet Bluetana, the Scourge of Pump Skimmers