recommended reading

FBI Puts a $100,000 Bounty on Most-Wanted Cyber Criminal

Thinkstock

As part of a crackdown on fugitive hackers, the FBI has added more digital racketeers to the decades-old Most Wanted program and upped the ante for their arrest. The cybercriminal category, consequently, now has its own Top 10 list, FBI officials announced this week.

The gangsters of Cyber's Most Wanted are more diverse than those that mixed with former Most Wanted mainstay James "Whitey" Bulger, Irish godfather of Boston. The list, along with rewards for turning in the hustlers, offers a window into the global evolution of cybercrime:

  • Alexsey Belan stands accused of penetrating the computer networks of three U.S.-based companies to steal sensitive databases and employee identities. He then profited from sales of the purloined user data and passwords. ($100,000
  • Farhan Arshad and Noor Aziz Uddin allegedly hacked into business telephone systems worldwide, causing losses of more than $50 million for the phone companies and other organizations. ($50,000 each)
  • Carlos Perez-Melara operated a private investigator website that purported to offer jilted clients a way to catch cheating significant others. The service sent suspected cheaters a greeting card containing spyware. The surveillance software “collected keystrokes and other incoming and outgoing electronic communications” and, true to its claims, would “periodically send email messages back to the purchasers of the service,” containing the cheaters’ passwords, browsing histories, intercepted messages, and keystroke logs. ($50,000) 
  • Andrey Nabilevich Taame allegedly was involved in Operation Ghost Click, a malware distribution scheme that redirected infected computers to fraudulent websites. The ruse hijacked more than 4 million computers in more than 100 countries. ($50,000)
  • Peteris Sahurovs is accused of selling poisonous cybersecurity programs that scammed Internet users out of more than $2 million. In one case, he took out an ad in an online newspaper that was really malware, which infected visitors on the news site and forced them to buy $49.95 antivirus software to regain control of their computers. ($50,000)
  • Shaileshkumar P. Jain robbed Internet users in more than 60 countries of $100 million through the sale of bogus software products. This was a "scareware" scheme similar to the Sahurovs incident. ($20,000)
  • Bjorn Daniel Sundin was one of Jain's partners. ($20,000) 
  • Artem Semenov is wanted for participating in an Eastern European cybercrime ring with operations in New York. The group recruits "money mules" to open bank accounts, cash out unauthorized money transfers, and then wire the money overseas.($50,000)
  • Alexandr Sergeyevich Bobnev allegedly broke into the accounts of a major investment services firm and transferred funds out of accounts to money mules in the United States. The mules then had to transfer the money back to him.($50,000) 

"The expansion of the Cyber’s Most Wanted list is a reflection of the FBI’s increased efforts in this area," FBI officials said in a statement.

A recent capture that grabbed global attention was that of Lauri Love, 28, who allegedly confiscated massive amounts of personal data on U.S. military members so he could "disrupt" government operations.

The FBI and Army Criminal Investigation Command led a probe into his dealings. The U.K. National Crime Agency then arrested Love in connection with another ongoing investigation.

The young Brit was a high-profile activist in the Scottish Occupy movement that caught on worldwide in 2011, according to the Daily Mail

Come to Nextgov Prime in Washington Nov. 20-21 to learn how agencies are coping with the biggest cyber threats and security challenges. Registration is free for federal employees.

Threatwatch Alert

Accidentally leaked credentials / Misplaced data

Hospital Breach Affects Thousands of Patients

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.