{"id":10691,"date":"2017-12-01T19:17:45","date_gmt":"2017-12-02T03:17:45","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/01\/news-4463\/"},"modified":"2017-12-01T19:17:45","modified_gmt":"2017-12-02T03:17:45","slug":"news-4463","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/01\/news-4463\/","title":{"rendered":"Carding Kingpin Sentenced Again. Yahoo Hacker Pleads Guilty"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Sat, 02 Dec 2017 01:15:15 +0000<\/strong><\/p>\n<p><strong>Roman Seleznev<\/strong>, a Russian man who is already serving a record 27-year sentence in the United States for cybercrime charges, was handed a 14-year sentence this week by a federal judge in Atlanta for his role in a credit card and identity theft conspiracy that prosecutors say netted more than $50 million. Separately, a Canadian national has pleaded guilty to charges of helping to steal more than a billion user account credentials from <strong>Yahoo<\/strong>.<\/p>\n<p>Seleznev, 33, was given the <a href=\"https:\/\/www.justice.gov\/opa\/pr\/russian-cyber-criminal-sentenced-14-years-prison-role-organized-cybercrime-ring-responsible\" target=\"_blank\" rel=\"noopener\">14-year sentence<\/a> in connection with two prosecutions that were consolidated in Georgia: The <a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/11\/eight_indicted_in_9m_rbs_world.html\" target=\"_blank\" rel=\"noopener\">2008 heist<\/a> against Atlanta-based credit card processor <strong>RBS Worldpay<\/strong>; and a case out of Nevada where he was charged as a leading merchant of stolen credit cards at <strong>carder[dot]su<\/strong>, at one time perhaps the most bustling fraud forum where members openly marketed a variety of cybercrime-oriented services.<\/p>\n<div id=\"attachment_41728\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-41728\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/12\/seleznevcash.png\" alt=\"\" width=\"585\" height=\"353\" \/><\/p>\n<p class=\"wp-caption-text\">Roman Seleznev, pictured with bundles of cash. Image: US DOJ.<\/p>\n<\/div>\n<p>Seleznev&#8217;s conviction comes more than a year after he was convicted in a Seattle court on 38 counts of cybercrime charges, including wire fraud and aggravated identity theft. The Seattle conviction earned Seleznev a 27-year prison sentence &#8212; the most jail time ever given to an individual convicted of cybercrime charges in the United States.<\/p>\n<p>This latest sentence will be served concurrently &#8212; meaning it will not add any time to his 27-year sentence. But it&#8217;s worth noting because Seleznev is appealing the Seattle verdict. In the event he prevails in Seattle and gets that conviction overturned, he will still serve out his 14-year sentence in the Georgia case because he pleaded guilty to those charges and waived his right to an appeal.<\/p>\n<p>Prosecutors say Seleznev, known in the underworld by his hacker nicknames &#8220;nCux&#8221; and &#8220;Bulba,&#8221; enjoyed an extravagant lifestyle prior to his arrest, driving expensive sports cars and dropping tens of thousands of dollars at lavish island vacation spots.\u00a0The son of an influential Russian politician, Seleznev made international headlines in 2014 after he was\u00a0<a href=\"http:\/\/www.reuters.com\/article\/2014\/07\/08\/us-usa-cybersecurity-arrest-idUSKBN0FD0Z020140708\" target=\"_blank\" rel=\"noopener\">captured<\/a>\u00a0while vacationing in\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Maldives\" target=\"_blank\" rel=\"noopener\">The Maldives<\/a>, a popular destination for Russians and one that\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2011\/06\/chronopay-co-founder-arrested\/\" target=\"_blank\" rel=\"noopener\">many Russian cybercriminals<\/a>\u00a0previously\u00a0<a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/09\/GusevViagra.jpg\" target=\"_blank\" rel=\"noopener\">considered<\/a>\u00a0to be\u00a0out of reach for\u00a0western law enforcement agencies.<\/p>\n<p>However, U.S. authorities were able to negotiate a secret deal with the Maldivian government to apprehend Seleznev. Following his capture, Seleznev was whisked away to Guam for\u00a0<a href=\"https:\/\/assets.documentcloud.org\/documents\/3673513\/Seleznev-US-Atty-Sentencing-Memo.pdf\" target=\"_blank\" rel=\"noopener\">more than a month<\/a>\u00a0before being transported to Washington state to stand trial for computer hacking charges.<\/p>\n<p>The\u00a0U.S. Justice Department says the laptop found with him when he was arrested contained more than 1.7 million stolen credit card numbers, and that evidence presented at trial showed that Seleznev earned tens of millions of dollars defrauding more than 3,400 financial institutions.<\/p>\n<p>Investigators also reportedly\u00a0<a href=\"http:\/\/www.seattletimes.com\/seattle-news\/crime\/seattle-jury-convicts-russian-man-of-massive-business-hacking-id-theft-scheme\/\" target=\"_blank\" rel=\"noopener\">found a smoking gun: a password cheat sheet<\/a>\u00a0that linked Seleznev to a decade\u2019s worth of criminal hacking. For more on Seleznev&#8217;s arrest and prosecution, see <a href=\"https:\/\/krebsonsecurity.com\/2017\/04\/the-backstory-behind-carder-kingpin-roman-seleznevs-record-27-year-prison-sentence\/\" target=\"_blank\" rel=\"noopener\">The Backstory Behind Carder Kingpin Roman Seleznev&#8217;s Record 27-Year Sentence<\/a>, and <a href=\"https:\/\/krebsonsecurity.com\/2014\/07\/feds-charge-carding-kingpin-in-retail-hacks\/\" target=\"_blank\" rel=\"noopener\">Feds Charge Carding Kingpin in Retail Hacks<\/a>.<\/p>\n<p>In an unrelated case, federal prosecutors in California <a href=\"https:\/\/www.justice.gov\/opa\/pr\/canadian-hacker-who-conspired-and-aided-russian-fsb-officers-pleads-guilty\" target=\"_blank\" rel=\"noopener\">announced a guilty plea<\/a> from <strong>Karim Baratov<\/strong>, one of <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwiVqsD9menXAhUFm-AKHaqrD-8QFggwMAE&amp;url=https%3A%2F%2Fkrebsonsecurity.com%2F2017%2F03%2Ffour-men-charged-with-hacking-500m-yahoo-accounts%2F&amp;usg=AOvVaw1hNqWKX8MzjCGi0xNTx4T6\" target=\"_blank\" rel=\"noopener\">four men indicted in March 2017<\/a> for hacking into Yahoo beginning in 2014. Yahoo initially said the intrusion exposed the usernames, passwords and account data for roughly 500 million Yahoo users, but in December 2016 Yahoo said the actual number of victims <a href=\"https:\/\/krebsonsecurity.com\/2016\/12\/my-yahoo-account-was-hacked-now-what\/\" target=\"_blank\" rel=\"noopener\">was closer to one billion<\/a> (read: all of its users).\u00a0<span id=\"more-41725\"><\/span><\/p>\n<p>Baratov, 22, is a Canadian and Kazakh national who lived in Canada (he&#8217;s now being held in California). He was charged with\u00a0being hired by two <a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Security_Service\" target=\"_blank\" rel=\"noopener\">Russian FSB<\/a> officer defendants in this case \u2014\u00a0<strong>Dmitry Dokuchaev,\u00a0<\/strong>33, and\u00a0<strong>Igor Sushchin<\/strong>, 43\u00a0\u2014 to hack into the email accounts of thousands of individuals. According to prosecutors,\u00a0Baratov\u2019s role in the charged conspiracy was to hack webmail accounts of individuals of interest to the FSB and send those accounts\u2019 passwords to Dokuchaev in exchange for money.<\/p>\n<div id=\"attachment_38569\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-38569\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/mrkarim-580x348.png\" alt=\"\" width=\"580\" height=\"348\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/mrkarim-580x348.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/mrkarim-768x461.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/mrkarim-940x564.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/mrkarim.png 1256w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">Karim Baratov, a.k.a. &#8220;Karim Taloverov,&#8221; as pictured in 2014 on his own site, mr-karim.com.<\/p>\n<\/div>\n<p>Baratov operated several business that he advertised openly online that could be hired to hack into email accounts at the world&#8217;s largest email providers, including Google, Yahoo and Yandex.\u00a0As part of his plea agreement, Baratov not only admitted to agreeing and attempting to hack at least 80 webmail accounts on behalf of one of his FSB co-conspirators, but also to hacking more than 11,000 webmail accounts in total from in or around 2010 until his arrest by Canadian authorities.<\/p>\n<p>Shortly after Baratov&#8217;s arrest and indictment, KrebsOnSecurity <a href=\"https:\/\/krebsonsecurity.com\/2017\/03\/four-men-charged-with-hacking-500m-yahoo-accounts\/\" target=\"_blank\" rel=\"noopener\">examined many of the email hacking services he operated<\/a>\u00a0and that were quite clearly tied to his name. One such business advertised the ability to steal email account passwords without actually changing the victim&#8217;s password. According to prosecutors, Baratov&#8217;s service relied on &#8220;spear phishing&#8221; emails that targeted individuals with custom content and enticed recipients to click a booby-trapped link.<\/p>\n<p>For example, one popular email hacking business\u00a0registered to Baratov was\u00a0<strong>xssmail[dot]com<\/strong>, which for several years advertised the ability to break into email accounts of virtually all of the major Webmail providers. XSS is short for \u201ccross-site-scripting.\u201d XSS attacks rely on vulnerabilities\u00a0in Web sites that don\u2019t properly parse data submitted by visitors in things like search forms or anyplace one might enter data on a Web site.<\/p>\n<div id=\"attachment_38567\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-38567\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/xssmail-580x377.png\" alt=\"\" width=\"580\" height=\"377\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/xssmail-580x377.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/xssmail-768x499.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/xssmail-940x611.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/03\/xssmail.png 1486w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">Archive.org&#8217;s cache of xssmail.com<\/p>\n<\/div>\n<p>In the context of phishing links, the user clicks the link and is actually taken to the domain he or she thinks she is visiting (e.g., yahoo.com) but the vulnerability allows the attacker to inject malicious code into the page that the victim is visiting.<\/p>\n<p>This can include fake login prompts that send any data the victim submits directly to the attacker. Alternatively, it could allow the attacker to steal \u201ccookies,\u201d text files that many sites place on visitors\u2019 computers to validate\u00a0whether they have visited the site previously, as well as if they have authenticated to the site already.<\/p>\n<p>Baratov pleaded guilty to nine counts, including one count of aggravated identity theft and eight violations of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_Fraud_and_Abuse_Act\" target=\"_blank\" rel=\"noopener\">Computer Fraud and Abuse Act<\/a>. His sentencing hearing is scheduled for Feb. 20, 2018. The aggravated identity theft charge carries a mandatory two-year sentence; each of the other counts is punishable by up to 10 years in jail and fines of $250,000, although any sentence he receives will likely be heavily tempered by <a href=\"https:\/\/en.wikipedia.org\/wiki\/United_States_Federal_Sentencing_Guidelines\" target=\"_blank\" rel=\"noopener\">U.S. federal sentencing guidelines<\/a>.<\/p>\n<p>Meanwhile, Baratov&#8217;s co-defendant Dokuchaev is embroiled in his own legal worries in Russia, charges that could carry a death sentence. He and his former boss\u00a0<strong>Sergei Mikhailov <\/strong>&#8212;\u00a0once deputy chief of the FSB&#8217;s Center for Information Security &#8212; were arrested in December 2016 by Russian authorities and charged with treason. Also charged with treason in connection with that case was <strong>Ruslan Stoyanov<\/strong>, a senior employee at Russian security firm <strong>Kaspersky Lab<\/strong>.<\/p>\n<p>There are many competing theories for the reasons behind their treason charges, some of which are explored in <a href=\"https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2017\/03\/16\/the-fbi-just-indicted-a-russian-official-for-hacking-but-why-did-russia-charge-him-with-treason\/\" target=\"_blank\" rel=\"noopener\">this Washington Post story<\/a>. I have my own theory, detailed in my January 2017 piece, <a href=\"https:\/\/krebsonsecurity.com\/2017\/01\/a-shakeup-in-russias-top-cybercrime-unit\/\" target=\"_blank\" rel=\"noopener\">A Shakeup in Russia&#8217;s Top Cybercrime Unit<\/a>.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/carding-kingpin-sentenced-again-yahoo-hacker-pleads-guilty\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/12\/seleznevcash.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Sat, 02 Dec 2017 01:15:15 +0000<\/strong><\/p>\n<p>Roman Seleznev, a Russian man who is already serving a record 27-year sentence in the United States for cybercrime charges, was handed a 14-year sentence this week by a federal judge in Atlanta for his role in a credit card and identity theft conspiracy that prosecutors say netted more than $50 million. Separately, a Canadian national has pleaded guilty to charges of helping to steal more than a billion user account credentials from Yahoo.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[12071,11645,11648,11649,3493,12073,16696,16803,16804,12074,11134,16805,11643],"class_list":["post-10691","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-bulba","tag-dmitry-dokuchaev","tag-karim-baratov","tag-karim-taloverov","tag-kaspersky-lab","tag-ncux","tag-neer-do-well-news","tag-pharma-wars","tag-rbs-worldpay-hack","tag-roman-seleznev","tag-ruslan-stoyanov","tag-sergei-mikhailov","tag-yahoo-hack"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10691"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10691\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10691"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}