16 Sept 2015

A Russian national today admitted his role in hacking that targeted major corporate networks, compromised 160M+ credit card numbers & resulted in hundreds of millions of dollars in losses – the largest such scheme ever prosecuted in the US

justice.gov/usao-nj/pr/rus…
Dmitriy Smilianets, 32, Moscow
pleaded guilty pleaded guilty to conspiracy to commit wire fraud in a manner affecting a financial institution.

Smilianets was arrested in the Netherlands 28 June 2012 and was extradited to the District of New Jersey 7 Sept 2012
The five defendants each played specific roles in the scheme.

Vladimir Drinkman, 34, of Syktyvkar and Moscow
Alexandr Kalinin, 28, of St. Petersburg, Russia

specialized in penetrating network security and gaining access to the corporate victims’ systems.
Drinkman &
Roman Kotov, 34, of Moscow

specialized in mining the networks to steal valuable data

Mikhail Rytikov, 28, of Odessa, Ukraine

Provided the hackers anonymous web-hosting services to hide their activities
Smilianets sold the information stolen by the other conspirators and distributed the proceeds of the scheme to the participants.
Drinkman and Kalinin were previously charged in New Jersey as “Hacker 1” and “Hacker 2” in a 2009 indictment charging Albert Gonzalez, 34, of Miami, Florida, in connection with five corporate data breaches – including the breach of Heartland Payment Systems Inc.
Kalinin is also charged in SDNY:
First is in connection with hacking computer servers used by NASDAQ

Second charges him and another Russian hacker, Nikolay Nasenkov, w/ an international scheme to steal bank account info from US financial institutions.
Rytikov was previously charged in the Eastern District of Virginia with an unrelated scheme.

Drinkman and Smilianets were arrested at the request of the United States while traveling in the Netherlands on 28 June 2012.

Kalinin, Kotov and Rytikov remain at large.
The five defendants penetrated the computer networks of several of the corporate victims and stole user names and passwords, means of identification, credit and debit card numbers and other corresponding personal ID info of cardholders. They allegedly acquired 160M+ card numbers
Instant message chats obtained by law enforcement revealed the defendants often targeted the victim companies for many months, waiting patiently as their efforts to bypass security were underway. They had malware implanted in multiple companies’ servers for more than a year
Smilianets was in charge of sales, selling the data only to trusted identity theft wholesalers. The end users encoded each dump onto the magnetic strip of a blank plastic card and cashed out the value of the dump by withdrawing money from ATMs or making purchases with the cards.
Unlike traditional Internet service providers, Rytikov allowed his clients to hack with the knowledge he would never keep records of their online activities or share information with law enforcement.
Over the course of the conspiracy, the defendants communicated through private and encrypted communications channels to avoid detection. Fearing law enforcement would intercept even those communications, some of the conspirators attempted to meet in person.
Co-conspirators

Albert Gonzalez
aka segvec
aka soupnazi
aka j4guarl7
a co-conspirator who is not charged as a defendant herein, resided in or near Miami

justice.gov/usao-nj/file/7…
Damon Patrick Toey
a co-conspirator who is not charged as a defendant herein, resided in or near Virginia Beach, Virginia, and in or near Miami

Vladislav Anatolievich Horohorin ("Horohorin")
aka "BadB"
resided in or near Moscow, Russia
Co-conspirator- I ("CC# I"), a co-conspirator who is not charged as a defendant herein, resided in or near Kiev, Ukraine
The Corporate Victims of Computer Hacking

NASDAQ
Heartland Payment Systems
Commidea
Dexia Bank
Dow Jones
"Bank A" (UAE)
Euronet
Visa
Global Payments Systems
Discover/Diners
Ingenicard

JetBlue
7-Eleven
Carrefour
JCPenny
Hannaford Brothers
Wet Seal Inc.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Fisher Ames

Fisher Ames Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @nimkef

Jan 16,
21 Oct 2020

15 Oct 2020, a federal grand jury in the Western District PA returned an indictment against six Russian military intel officers for their roles in targeting and compromising computer systems worldwide,

fbi.gov/wanted/cyber/g…
including:
those relating to critical infrastructure in Ukraine

a political campaign in France, and the country of Georgia

international victims of the “NotPetya” malware attacks (including critical infrastructure providers)
international victims associated with the 2018 Winter Olympic Games and investigations of nerve agent attacks that have been publicly attributed to the Russian government.
Read 6 tweets
Jan 14,
21 March 2017

On 30 Dec 2016, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election, Tillmann Werner was sitting down to breakfast in Bonn, Germany.

wired.com/2017/03/russia…
The news about the sanctions had broken overnight, so Werner, a researcher with the cybersecurity firm CrowdStrike, was still catching up on details.
Werner saw that the White House had targeted a short parade’s worth of Russian names and institutions:

two intelligence agencies
four senior intelligence officials
35 diplomats
three tech companies
two hackers
Read 62 tweets
Jan 13,
15 March 2017

A grand jury in California (Northern D) has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy

justice.gov/opa/pr/us-char…
Beginning in Jan 2014, they conspired to access Yahoo’s network and the contents of webmail accounts. The defendants are:

Dmitry Aleksandrovich Dokuchaev, 33, a Russian national and resident
Igor Anatolyevich Sushchin, 43, a Russian national and resident
Alexsey Alexseyevich Belan, aka “Magg,” 29, a Russian national and resident

Karim Baratov, aka “Kay,” “Karim Taloverov” and “Karim Akehmet Tokbergenov,” 22, a Canadian and Kazakh national and a resident of Canada
Read 36 tweets
Jan 13,
14 Aug 2015

The overall purpose of this paper is to scrutinize the contemporary hybrid warfare employed by Russia in Ukraine and determine which elements have been most critical for Russia’s success.

smallwarsjournal.com/jrnl/art/non-l…
After providing a brief overview of hybrid warfare, this paper asserts that information operations and special operations ultimately pave the way for success in hybrid warfare.
Since both of these components create a more favorable population, achieve the strategic initiative, and act as a force multiplier for insurgent elements, they result in early successes that provide the initiating actor escalation control.
Read 5 tweets
Jan 12,
March 2004

Julie Sirrs, a former military analyst for the Defense Intelligence Agency, was the first intelligence officer to report on the significance of Osama bin Laden moving his terrorist operation from the Sudan into Afghanistan.

observer.com/2004/03/exspoo…
Dr. al-Zawahiri & bin Laden have been partners since 1993, when bin Laden merged Al Qaeda w/ al-Zawahiri’s Egyptian Islamic Jihad. They met when bin Laden was treated for low blood pressure by al-Zawahiri, who is credited w/ the assassination of Egyptian president Anwar al Sadat.
al-Zawahiri & bin Laden announced the launch of their “campaign of terror” in November 1997

It was one month earlier that Julie Sirrs, made her first investigative trip to Afghanistan. But at that time, she was an odd duck within the American intelligence establishment.
Read 43 tweets
Jan 6,
6 Jan 2022

On January 5 Kazkh President Kassym-Jomart Tokayev stripped former Kazkh President Nursultan Nazarbayev of his role as head of the State Security Committee, the successor to the Soviet-era KGB.

intellinews.com/amid-kazakhsta…
That same day a private plane of Nazarbayev's daughter Dinara and her husband, oligarch Timur Kulibayev, reportedly departed for Kyrgyzstan, with other Nazarbayev family members possibly on board.
Alexey Venediktov, editor-in-chief of Echo of Moscow radio, reported the plane's departure, though it was unclear if the ex-president himself was on board, said a Russian Foreign Ministry source.

Nazarbayev was reported as ready to leave Kazakhstan “for medical treatment”.
Read 46 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(