{"id":1397,"date":"2013-03-13T14:04:46","date_gmt":"2013-03-13T18:04:46","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=1397"},"modified":"2020-02-26T10:37:04","modified_gmt":"2020-02-26T15:37:04","slug":"10-arrests-that-shook-the-cybercrime-underworld","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/","title":{"rendered":"10 arrests that shook the cybercrime underworld"},"content":{"rendered":"<p>Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering enough hard evidence to secure a conviction is no easy task. But the situation is gradually changing, and hackers \u2013 from those who steal personal photos of stars in the nude to the organizers of multi-million dollar scams \u2013 are now more frequently being brought to trial.<\/p>\n<p>The start of the 21<sup>st<\/sup> century was a veritable gold rush for cybercriminals. A rapidly increasing Internet audience that wasn\u2019t always that computer savvy, the dawn of online payment systems, and legislation that lagged well behind technology all made for rich pickings with little risk of being caught \u2013 something that always attracts criminal attention. Unsurprisingly, it didn\u2019t take long for unethical and blatantly illegal scams to grow from one-man operations into well-organized businesses. However, the good news is that with every passing day these cybercriminal gangs face greater risks than ever before. To demonstrate this we\u2019ll look at 10 recent cases that have ended with the cybercriminals in the dock.<\/p>\n<p><b>Call me nude: Hacking for sexy photos<\/b><\/p>\n<p>If you\u2019re young, pretty, and have recently become famous, immediately make your password more complex and install <a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">total protection<\/a> on your computer. This is the lesson that Canadian singer Carly Rae Jepsen learned the hard way. Last year hacker Christopher David Long accessed her personal data and files, including naked photos of her. According to some sources, the police began investigating the hack in March 2012; at the time Long was trying to sell the photos to the tabloids. The details of the investigation and the fate of the photos have not been disclosed, but the most important thing was that Long was finally charged in December, according to <a href=\"http:\/\/www.vancouversun.com\/entertainment\/Carly+Jepsen+reported+victim+Abbotsford+charged+with+hacking\/7681651\/story.html\" target=\"_blank\" rel=\"noopener nofollow\">The Vancouver Sun<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051418\/jepsen.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1399\" alt=\"jepsen\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051418\/jepsen.jpg\" width=\"640\" height=\"440\"><\/a><\/p>\n<p><b>First class ticket to jail: ZeuS botmaster pays for stolen millions<\/b><\/p>\n<p><a href=\"http:\/\/www.bangkokpost.com\/news\/security\/329622\/police-nab-suspect-wanted-for-hacking\" target=\"_blank\" rel=\"noopener nofollow\">Algerian hacker Hamza Bendelladj was arrested<\/a> at a Bangkok airport in early January after local police were tipped off by FBI agents who had been tracking the 24-year-old for three years. They suspected him of being behind a botnet based on the notorious <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/zeus-source-code-leaked-051011\" target=\"_blank\" rel=\"noopener nofollow\">ZeuS<\/a>. Bendelladj is alleged to have netted up to $20 million from just one of a series of illegal transactions involving 217 banks and financial institutions. Not surprisingly, when he was busted he was enjoying a luxurious lifestyle and jetting around the world in first class. He now faces extradition to the US and a court case in the state of Georgia.<\/p>\n<p><b>Sharp card dealt: 12 years for stolen data<\/b><\/p>\n<p>At the beginning of February, Dutch cybercriminal David Benjamin Schrooten, better known as Fortezza, was <a href=\"http:\/\/www.computerworld.com\/s\/article\/9236488\/Dutch_man_sentenced_in_US_to_12_years_in_credit_card_scam?taxonomyId=17\" target=\"_blank\" rel=\"noopener nofollow\">sentenced to 12 years<\/a>. He was part of a criminal group responsible for the theft of over 100,000 credit card numbers that were then sold on a special underground website for stolen card details. Sentences had already been handed down to some of his accomplices, while others are waiting for their cases to be heard. Interestingly, the investigation revealed that Schrooten tried to hack other similar \u201ccarding\u201d forums in a bid to disrupt their activities and steal their customers. He was meticulous in covering his tracks, but the long arm of the law eventually caught up with him in Romania and he was extradited to the US.<\/p>\n<div class=\"pullquote\">The criminal group stole more than 100,000 credit card numbers and then sold the details to other criminals.<\/div>\n<p><b>105 years for sextortion<\/b><\/p>\n<p>At the end of January the FBI <a href=\"http:\/\/www.fbi.gov\/losangeles\/press-releases\/2013\/fbi-arrests-glendale-man-in-sextortion-case\" target=\"_blank\" rel=\"noopener nofollow\">arrested<\/a> Karen \u201cGary\u201d Kazaryan, 27. This particular hacker wasn\u2019t after material gain; he focused on cracking Facebook, Skype and email accounts belonging to women. Once he had access Kazaryan changed the password, which locked victims out of their own online accounts. Once he controlled the accounts, Kazaryan searched emails and other files for naked or semi-naked pictures of the victims, as well as other information, such as passwords and the names of their friends. He then used that information to coerce his victims into taking their clothes off in front of a web camera. Investigators found approximately 3,000 nude or semi-nude pictures of women on Kazaryan\u2019s computer \u2013 some of them he got from hacked accounts while others were saved from Skype sessions. \u00a0In total, authorities have brought 30 charges of unauthorized computer intrusion, and if found guilty on all of them, he faces 105 years behind bars.<\/p>\n<div class=\"pullquote\">DDoS attack \u2013 an attack that uses multiple computers to simultaneously overwhelm a server and make legitimate access impossible or extremely unstable.<\/div>\n<p><b>Anonymous behind bars: Ideological hacking is still a crime<\/b><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051414\/anon1.jpg\"><img decoding=\"async\" class=\"size-thumbnail wp-image-1402 alignleft\" alt=\"anon\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051414\/anon1-150x150.jpg\" width=\"150\" height=\"150\"><\/a>The \u201chacktivist\u201d movement hacks or takes down websites in order to make a political point, rather than to earn money. However, this is still illegal, and the UK\u2019s Southwark Crown Court has confirmed that hacktivists are subject to the same penalties as conventional cybercriminals. According to <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-21187632\" target=\"_blank\" rel=\"noopener nofollow\">BBC News<\/a>, hackers Christopher Weatherhead and Ashley Rhodes got 18 and 7 months in prison respectively for organizing DDoS attacks targeting PayPal, MasterCard, Visa and others. The Anonymous activists were unhappy that these organizations tried to hinder fundraising for WikiLeaks. According to the judge, the hackers took extremely sophisticated precautions to conceal their identity, but the investigation was still successfully wrapped up.<\/p>\n<p><b>\u2018Anonymous\u2019 Krasnoyarsk-style: DDoS attack with political overtones<\/b><\/p>\n<p>Police in Krasnoyarsk investigated two very similar cases this winter. A court in the Siberian city handed a 25,000 ruble fine and two years on probation to Pavel Spassky after the radio-electronics college student set up a DDoS attack on two government websites on May 6-7, 2012. A similar case was brought against another Krasnoyarsk resident for an attack on the kremlin.ru website on May 9. The latter accused maintains his innocence, but faces up to four years in jail if convicted.<\/p>\n<p><b>Making millions: 100 euros at a time<\/b><\/p>\n<p>Eleven members of a criminal gang arrested in Spain this February had been earning about 1 million euros a year by spreading the <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/how-facebook-prepared-be-hacked-030713\" target=\"_blank\" rel=\"noopener nofollow\">Police virus<\/a>. This is a cyberextortion tool, accusing the victim of committing some offense and blocking his computer until a \u201cfine\u201d of 100 euros is handed over. The malware also steals the victim\u2019s personal data. A final sentence has not yet been handed down in this case, but in recent years Spain has jailed a number of hi-tech offenders.<\/p>\n<p><b>Ali-Baba<\/b>\u00a0<b>and the 4 thieves <\/b><\/p>\n<p>Just a week ago, four cybercriminals were arrested in Dubai after <a href=\"http:\/\/gulfnews.com\/news\/gulf\/uae\/crime\/gang-arrested-for-hacking-dubai-exchange-companies-accounts-1.1153543\" target=\"_blank\" rel=\"noopener nofollow\">allegedly stealing at least $2 million<\/a> from companies in the Emirates. Using a few scams and hacker techniques, the attackers were siphoning funds into their bank accounts as well as overseas. Some members of the gang, which includes people of Asian and African origin, have fled the country \u2013 a warrant for their arrest has been issued by Interpol.<\/p>\n<p><b>10 years for a star<\/b><\/p>\n<p>In a rare case \u2013 <a href=\"http:\/\/www.theinquirer.net\/inquirer\/news\/2232751\/celebrity-cyber-stalker-is-sent-down-for-10-yearshttp:\/www.theinquirer.net\/inquirer\/news\/2232751\/celebrity-cyber-stalker-is-sent-down-for-10-years\" target=\"_blank\" rel=\"noopener nofollow\">a hacker was sentenced to 10 years in prison<\/a> and a $66,000 fine, even though the prosecution demanded only a six-year sentence. Christopher Chaney was convicted of illegally accessing the email accounts of celebrities, including Scarlett Johansson, Christina Aguilera and Mila Kunis. The most widely reported consequence was the theft and publication of nude photos of the stars, some of whom chose to appear in court in person to support the prosecution\u2019s case. However, from a security perspective there\u2019s another interesting detail \u2013 Cheney had a very simple system to get past most passwords. He just pressed the \u201cForgot password\u201d button and answered a couple of simple questions \u2013 easily finding the answers in open sources and celebrity bios. This was a huge success, not just once or twice but 50 times!<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051415\/scarlett2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1401\" alt=\"scarlett2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/03\/06051415\/scarlett2.jpg\" width=\"638\" height=\"445\"><\/a><\/p>\n<p><b>A family business<\/b><\/p>\n<p>At first glance, Vladimir Zdorovenin and his son Kirill ran a legal online business. However, as established by the US authorities, online stores owned by the Zdorovenins were occasionally <a href=\"http:\/\/www.bloomberg.com\/news\/2013-01-04\/russian-cyber-fraud-orchestrator-gets-3-year-prison-term.html\" target=\"_blank\" rel=\"noopener nofollow\">drawing down funds from their clients\u2019 cards<\/a> without approval. Funds were also taken from cards where the details had been obtained illegally (e.g. bought at underground forums). The family had already gone on the run, but in January the Swiss authorities detained Vladimir and deported him to the US to serve a three-year jail term. Kirill\u2019s whereabouts remain unknown.<\/p>\n<p>As we can see, it is not that easy to hold cybercriminals liable \u2013 and the process does not always run smoothly. Despite these problems, the global battle against cybercrime is <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/ten-major-cybercrime-busts-031213\" target=\"_blank\" rel=\"noopener nofollow\">noticeably turning in favor of the authorities<\/a>: experts are cooperating with law enforcement agencies, courts are learning to deal with new types of material evidence, and increasingly cybercriminals are ending up where they belong \u2013 behind bars.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering<\/p>\n","protected":false},"author":32,"featured_media":1398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[335,77,78],"class_list":{"0":"post-1397","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-arrests","9":"tag-cybercrime","10":"tag-hackers"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/10-arrests-that-shook-the-cybercrime-underworld\/561\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/1397\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/arrests\/","name":"arrests"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1397"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1397\/revisions"}],"predecessor-version":[{"id":32710,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1397\/revisions\/32710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1398"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}