Blockchain CyberWarfare / ExoWarfare

Blockwart: Russian National Arrested For Cyber Crime In Bangkok With $820 Million In Bitcoin

Blockwart

 

Police have apprehended a Russian citizen believed to be the number two in an international cybercrime organization, the Bangkok Post reported.

Sergey Sergeyevich Medvedev was arrested in Bangkok last Friday, Feb. 2, by the Thai Crime Suppression Division (CSD) on a request from the US Federal Bureau of Investigation. A laptop and documents were taken as evidence by the CSD.

A source told The Bangkok post that evidence showed that Medvedev had over 100,000 Bitcoin (BTC) at the time of his arrest, approximately $820 mln. However, the Post wrote that Medvedev’s 100,000 BTC was equal to about 100 mln baht, when it is actually equal to 26,523,087,316 baht.

Medvedev allegedly was an administrator for the Dark Web site Infraud – whose slogan was “In Fraud We Trust” – that dealt primarily in the sale of stolen credit cards and identities and illegally obtained government documents.

On Feb. 7 the US Department of Justice (DOJ) had released an indictment of 36 individuals, not including Medvedev, charged with participating in Infraud. The DOJ has now arrested 13 criminals from 17 countries for defrauding victims of over $530 mln as well as over $2.2 bln in losses.

The coordinated effort to apprehend the alleged perpetrators involved the US, Australia, the UK, France, Italy, Kosovo, Serbia, and additionally Thailand, according to the Bangkok Post.

Infraud was purportedly founded by Ukrainian national Svyatoslav Bondarek in 2010. Bondarek disappeared from online activity in 2015, which is when Medvedev reportedly took control over Infraud.

Cybersecurity news site CyberScoop claims that Medvedev allegedly operated the “escrow service” for Infraud, which, according to the DOJ’s Justice News release:

“facilitate[d] illicit digital currency transactions among its members and employed screening protocols that purported to ensure only high quality vendors of stolen cards, personally identifiable information, and other contraband.”

It was forbidden within the organization to trade in stolen information from victims located in Russia, a rule common to many cybercrime groups, writes CyberScoop.

The Bangkok Post site is currently unavailable to those located in Russia, but Russian news outlet RBK posted an article on Medvedev’s arrest with a link to a cached version of the Bangkok Post article.

from: https://cointelegraph.com/news/russian-national-arrested-for-cyber-crime-in-bangkok-allegedly-had-82-mln-in-btc

This was reported 08 FEB 2018 by Brian Krebs:

U.S. Arrests 13, Charges 36 in ‘Infraud’ Cybercrime Forum Bust

The U.S. Justice Department announced charges on Wednesday against three dozen individuals thought to be key members of ‘Infraud,” a long-running cybercrime forum that federal prosecutors say cost consumers more than a half billion dollars. In conjunction with the forum takedown, 13 alleged Infraud members from the United States and six other countries were arrested.

 

 

 
A screenshot of the Infraud forum, circa Oct. 2014.
Like most other crime forums, it had special sections dedicated to vendors
of virtually every kind of cybercriminal goods or services imaginable.
Click to enlarge.

Started in October 2010, Infraud was short for “In Fraud We Trust,” and collectively the forum referred to itself as the “Ministry of Fraudulently [sic] Affairs.” As a mostly English-language fraud forum, Infraud attracted nearly 11,000 members from around the globe who sold, traded and bought everything from stolen identities and credit card accounts to ATM skimmers, botnet hosting and malicious software.

“Today’s indictment and arrests mark one of the largest cyberfraud enterprise prosecutions ever undertaken by the Department of Justice,” said John P. Cronan, acting assistant attorney general of the Justice Department’s criminal division. “As alleged in the indictment, Infraud operated like a business to facilitate cyberfraud on a global scale.”

The complaint released by the DOJ lists 36 Infraud members — some only by their hacker nicknames, others by their alleged real names and handles, and still others just as “John Does.” Having been a fairly regular lurker on Infraud over the past seven years who has sought to independently identify many of these individuals, I can say that some of these names and nick associations sound accurate but several do not.

The government says the founder and top member of Infraud was Svyatoslav Bondarenko, a hacker from Ukraine who used the nicknames “Rector” and “Helkern.” The first nickname is well supported by copies of the forum obtained by this author several years back; indeed, Rector’s profile listed him an administrator, and Rector can be seen on countless Infraud discussion threads vouching for sellers who had paid the monthly fee to advertise their services in “sticky” threads on the forum.

However, I’m not sure the Helkern association with Bondarenko is accurate. In December 2014, just days after breaking the story about the theft of some 40 million credit and debit cards from retail giant Target, KrebsOnSecurity posted a lengthy investigation into the identity of “Rescator” — the hacker whose cybercrime shop was identified as the primary vendor of cards stolen from Target.

That story showed that Rescator changed his nickname from Helkern after Helkern’s previous cybercrime forum (Darklife) got massively hacked, and it presented clues indicating that Rescator/Helkern was a different Ukrainian man named Andrey Hodirevski. For more on that connection, see Who’s Selling Cards from Target.

Also, Rescator was a separate vendor on Infraud, and there are no indications that I could find suggesting that Rector and Rescator were the same people. Here is Rescator’s most recent sales thread for his credit card shop on Infraud — dated almost a year after the Target breach. Notice the last comment on that thread alleges that Rescator had recently been arrested and that his shop was being run by law enforcement officials:

 

 

Another top administrator of Infraud used the nickname “Stells.” According to the Justice Department, Stells’ real name is Sergey Medvedev. The government doesn’t describe his exact role, but it appears to have been administering the forum’s escrow service (see screenshot below).

Most large cybercrime forums have an escrow service, which holds the buyer’s virtual currency until forum administrators can confirm the seller has consummated the transaction acceptably to both parties. The escrow feature is designed to cut down on members ripping one another off — but it also can add considerably to the final price of the item(s) for sale.

In April 2016, Medvedev would take over as the “admin and owner” of Infraud, after he posted a note online saying that Bondarenko had gone missing, the Justice Department said.

 

 

One defendant in the case, a well-known vendor of stolen credit and debit cards who goes by the nickname “Zo0mer,” is listed as a John Doe. But according to a New York Times story from 2006, Zo0mer’s real name is Sergey Kozerev, and he hails from St. Petersburg, Russia.

The indictments also list two other major vendors of stolen credit and debit cards: hackers who went by the nicknames “Unicc” and “TonyMontana” (the latter being a reference to the fictional gangster character played by Al Pacino in the 1983 movie Scarface). Both hackers have long operated and operate to this day their own carding shops:

 

Unicc shop, which sells stolen credit card data as well as Social Security numbers
and other consumer information that can be used for identity theft.

 

The government says Unicc’s real name is Andrey Sergeevich Novak. TonyMontana is listed in the complaint as John Doe #1.

 

TonyMontana’s carding shop.

 

Perhaps the most successful vendor of skimming devices made to be affixed to ATMs and fuel pumps was a hacker known on Infraud and other crime forums as “Rafael101.” Several of my early stories about new skimming innovations came from discussions with Rafael in which this author posed as an interested buyer and asked for videos, pictures and technical descriptions of his skimming devices.

A confidential source who asked not to be named told me a few years back that Rafael had used the same password for his skimming sales accounts on multiple competing cybercrime forums. When one of those forums got hacked, it enabled this source to read Rafael’s emails (Rafael evidently used the same password for his email account as well).

The source said the emails showed Rafael was ordering the parts for his skimmers in bulk from Chinese e-commerce giant Alibaba, and that he charged a significant markup on the final product. The source said Rafael had the packages all shipped to a Jose Gamboa in Norwalk, Calif — a suburb of Los Angeles. Sure enough, the indictment unsealed this week says Rafael’s real name is Jose Gamboa and that he is from Los Angeles.

 

A private message from the skimmer vendor Rafael101,
from on a competing cybercrime forum (carder.su) in 2012.

 

The Justice Department says the arrests in this case took place in Australia, France, Italy, Kosovo, Serbia, the United Kingdom and the United States. The defendants face a variety of criminal charges, including identity theft, bank fraud, wire fraud and money laundering. A copy of the indictment is available here.

Tags: , , , , , , , , , , , , , , ,

 

from: https://krebsonsecurity.com/2018/02/u-s-arrests-13-charges-36-in-infraud-cybercrime-forum-bust/