recommended reading

FBI Puts a $100,000 Bounty on Most-Wanted Cyber Criminal


As part of a crackdown on fugitive hackers, the FBI has added more digital racketeers to the decades-old Most Wanted program and upped the ante for their arrest. The cybercriminal category, consequently, now has its own Top 10 list, FBI officials announced this week.

The gangsters of Cyber's Most Wanted are more diverse than those that mixed with former Most Wanted mainstay James "Whitey" Bulger, Irish godfather of Boston. The list, along with rewards for turning in the hustlers, offers a window into the global evolution of cybercrime:

  • Alexsey Belan stands accused of penetrating the computer networks of three U.S.-based companies to steal sensitive databases and employee identities. He then profited from sales of the purloined user data and passwords. ($100,000
  • Farhan Arshad and Noor Aziz Uddin allegedly hacked into business telephone systems worldwide, causing losses of more than $50 million for the phone companies and other organizations. ($50,000 each)
  • Carlos Perez-Melara operated a private investigator website that purported to offer jilted clients a way to catch cheating significant others. The service sent suspected cheaters a greeting card containing spyware. The surveillance software “collected keystrokes and other incoming and outgoing electronic communications” and, true to its claims, would “periodically send email messages back to the purchasers of the service,” containing the cheaters’ passwords, browsing histories, intercepted messages, and keystroke logs. ($50,000) 
  • Andrey Nabilevich Taame allegedly was involved in Operation Ghost Click, a malware distribution scheme that redirected infected computers to fraudulent websites. The ruse hijacked more than 4 million computers in more than 100 countries. ($50,000)
  • Peteris Sahurovs is accused of selling poisonous cybersecurity programs that scammed Internet users out of more than $2 million. In one case, he took out an ad in an online newspaper that was really malware, which infected visitors on the news site and forced them to buy $49.95 antivirus software to regain control of their computers. ($50,000)
  • Shaileshkumar P. Jain robbed Internet users in more than 60 countries of $100 million through the sale of bogus software products. This was a "scareware" scheme similar to the Sahurovs incident. ($20,000)
  • Bjorn Daniel Sundin was one of Jain's partners. ($20,000) 
  • Artem Semenov is wanted for participating in an Eastern European cybercrime ring with operations in New York. The group recruits "money mules" to open bank accounts, cash out unauthorized money transfers, and then wire the money overseas.($50,000)
  • Alexandr Sergeyevich Bobnev allegedly broke into the accounts of a major investment services firm and transferred funds out of accounts to money mules in the United States. The mules then had to transfer the money back to him.($50,000) 

"The expansion of the Cyber’s Most Wanted list is a reflection of the FBI’s increased efforts in this area," FBI officials said in a statement.

A recent capture that grabbed global attention was that of Lauri Love, 28, who allegedly confiscated massive amounts of personal data on U.S. military members so he could "disrupt" government operations.

The FBI and Army Criminal Investigation Command led a probe into his dealings. The U.K. National Crime Agency then arrested Love in connection with another ongoing investigation.

The young Brit was a high-profile activist in the Scottish Occupy movement that caught on worldwide in 2011, according to the Daily Mail

Come to Nextgov Prime in Washington Nov. 20-21 to learn how agencies are coping with the biggest cyber threats and security challenges. Registration is free for federal employees.

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.