recommended reading

FBI Puts a $100,000 Bounty on Most-Wanted Cyber Criminal

Thinkstock

As part of a crackdown on fugitive hackers, the FBI has added more digital racketeers to the decades-old Most Wanted program and upped the ante for their arrest. The cybercriminal category, consequently, now has its own Top 10 list, FBI officials announced this week.

The gangsters of Cyber's Most Wanted are more diverse than those that mixed with former Most Wanted mainstay James "Whitey" Bulger, Irish godfather of Boston. The list, along with rewards for turning in the hustlers, offers a window into the global evolution of cybercrime:

  • Alexsey Belan stands accused of penetrating the computer networks of three U.S.-based companies to steal sensitive databases and employee identities. He then profited from sales of the purloined user data and passwords. ($100,000
  • Farhan Arshad and Noor Aziz Uddin allegedly hacked into business telephone systems worldwide, causing losses of more than $50 million for the phone companies and other organizations. ($50,000 each)
  • Carlos Perez-Melara operated a private investigator website that purported to offer jilted clients a way to catch cheating significant others. The service sent suspected cheaters a greeting card containing spyware. The surveillance software “collected keystrokes and other incoming and outgoing electronic communications” and, true to its claims, would “periodically send email messages back to the purchasers of the service,” containing the cheaters’ passwords, browsing histories, intercepted messages, and keystroke logs. ($50,000) 
  • Andrey Nabilevich Taame allegedly was involved in Operation Ghost Click, a malware distribution scheme that redirected infected computers to fraudulent websites. The ruse hijacked more than 4 million computers in more than 100 countries. ($50,000)
  • Peteris Sahurovs is accused of selling poisonous cybersecurity programs that scammed Internet users out of more than $2 million. In one case, he took out an ad in an online newspaper that was really malware, which infected visitors on the news site and forced them to buy $49.95 antivirus software to regain control of their computers. ($50,000)
  • Shaileshkumar P. Jain robbed Internet users in more than 60 countries of $100 million through the sale of bogus software products. This was a "scareware" scheme similar to the Sahurovs incident. ($20,000)
  • Bjorn Daniel Sundin was one of Jain's partners. ($20,000) 
  • Artem Semenov is wanted for participating in an Eastern European cybercrime ring with operations in New York. The group recruits "money mules" to open bank accounts, cash out unauthorized money transfers, and then wire the money overseas.($50,000)
  • Alexandr Sergeyevich Bobnev allegedly broke into the accounts of a major investment services firm and transferred funds out of accounts to money mules in the United States. The mules then had to transfer the money back to him.($50,000) 

"The expansion of the Cyber’s Most Wanted list is a reflection of the FBI’s increased efforts in this area," FBI officials said in a statement.

A recent capture that grabbed global attention was that of Lauri Love, 28, who allegedly confiscated massive amounts of personal data on U.S. military members so he could "disrupt" government operations.

The FBI and Army Criminal Investigation Command led a probe into his dealings. The U.K. National Crime Agency then arrested Love in connection with another ongoing investigation.

The young Brit was a high-profile activist in the Scottish Occupy movement that caught on worldwide in 2011, according to the Daily Mail

Come to Nextgov Prime in Washington Nov. 20-21 to learn how agencies are coping with the biggest cyber threats and security challenges. Registration is free for federal employees.

Threatwatch Alert

Social Media Takeover

Qatar News Agency Says Hackers Published Fake Stories

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.