//
you're reading...
Politics, Congress, Investigation, Republicans, FBI, internet, health, Economy, Education, Wikipedia, local news, Press Release, Justice Department, Democrats, meta, Fraud, National News, Environment

PRESS RELEASE: Russian National, Vladimir Drinkman Charged in Largest Known Data Breach Prosecution Extradited to United States

Department of Justice
Office of Public Affairs
FOR IMMEDIATE RELEASE
Tuesday, February 17, 2015

Russian National Charged in Largest Known Data Breach Prosecution Extradited to United States
Defendant Brought From Netherlands

After Fighting Extradition for Over Two Years

A Russian national appeared in federal court in Newark today after being extradited from the Netherlands to face charges that he conspired in the largest international hacking and data breach scheme ever prosecuted in the United States, announced Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, Secretary Jeh Johnson of the Department of Homeland Security, U.S. Attorney Paul J. Fishman of the District of New Jersey and Acting Director Joseph P. Clancy of the U.S. Secret Service.

Vladimir Drinkman, 34, of Syktyykar and Moscow, Russia, was charged for his alleged role in a data theft conspiracy that targeted major corporate networks, stole more than 160 million credit card numbers, and caused hundreds of millions of dollars in losses. Prior to his extradition, he had been detained by the Dutch authorities since his arrest in the Netherlands on June 28, 2012.

Drinkman appeared today before U.S. Magistrate Judge James B. Clark and entered a plea of not guilty to all 11 counts charged in the indictment and was ordered detained without bail. Trial before U.S. District Judge Jerome B. Simandle was scheduled for April 27, 2015.

“Cyber criminals conceal themselves in one country and steal information located in another country, impacting victims around the world,” said Assistant Attorney General Caldwell. “Hackers often take advantage of international borders and differences in legal systems, hoping to evade extradition to face justice. This case and today’s extradition demonstrates that through international cooperation, and through great teamwork between the Department of Justice and the Department of Homeland Security, we are able to bring cyber thieves to justice in the United States, wherever they may commit their crimes.”

“Drinkman’s extradition on the indictment this office brought more than a year and a half ago shows how relentlessly we will pursue those who are charged with these serious crimes,” said U.S. Attorney Fishman. “The incredibly sophisticated work with our partners at the U.S. Secret Service to uncover this enormous, far-reaching scheme demanded an equal effort by our colleagues at the Department of Justice Criminal Division in Washington and our law enforcement partners overseas to bring the defendant back to face these charges.”

“This case demonstrates our commitment to fulfilling an important part of our integrated mission; that of protecting our Nation’s critical financial infrastructure,” said Acting Director Clancy. “Our success in this investigation and other similar investigations is a credit to our skilled and relentless cyber investigators. Our determination, coupled with our network of foreign law enforcement partners, ensures that our investigative reach can expand beyond the borders of the United States.”

According to the second superseding indictment, unsealed on July 25, 2013, and other court filings, Drinkman and four co-defendants each served particular roles in the scheme. Drinkman and Alexandr Kalinin, 28, of St. Petersburg, Russia, each allegedly specialized in penetrating network security and gaining access to the corporate victims’ systems. Roman Kotov, 33, of Moscow, allegedly specialized in mining the networks Drinkman and Kalinin compromised to steal valuable data. According to allegations in the indictment, the hackers hid their activities using anonymous web-hosting services provided by Mikhail Rytikov, 27, of Odessa, Ukraine. Dmitriy Smilianets, 31, of Moscow, then allegedly sold the stolen information and distributed the proceeds of the scheme to the participants.

Drinkman and his co-defendants are charged with attacks on NASDAQ, 7-Eleven, Carrefour, JCP, Hannaford, Heartland, Wet Seal, Commidea, Dexia, JetBlue, Dow Jones, Euronet, Visa Jordan, Global Payment, Diners Singapore and Ingenicard. It is not alleged that the NASDAQ hack affected its trading platform.

Drinkman and Kalinin were previously charged in New Jersey as “Hacker 1” and “Hacker 2” in a 2009 indictment charging Albert Gonzalez, 33, of Miami, in connection with five corporate data breaches, including the breach of Heartland Payment Systems Inc., which at the time was the largest ever reported. Gonzalez is currently serving 20 years in federal prison for those offenses. Kalinin is also charged in two federal indictments in the Southern District of New York: one charges Kalinin in connection with hacking certain computer servers used by NASDAQ and the second charges him and another Russian hacker, Nikolay Nasenkov, with an international scheme to steal bank account information from U.S.-based financial institutions. Rytikov was previously charged in the Eastern District of Virginia with an unrelated scheme.

Drinkman and Smilianets were arrested at the request of the United States while traveling in the Netherlands on June 28, 2012. Smilianets was extradited on Sept. 7, 2012, and remains in federal custody. Kalinin, Kotov and Rytikov remain at large. All of the defendants are Russian nationals except for Rytikov, who is a citizen of Ukraine.

The Attacks

According to allegations in the indictment, the five defendants conspired with others to penetrate the computer networks of several of the largest payment processing companies, retailers and financial institutions in the world, stealing the personal identifying information of individuals. They allegedly took user names and passwords, means of identification, credit and debit card numbers and other corresponding personal identification information of cardholders. The conspirators allegedly acquired at least 160 million card numbers through hacking.

The initial entry was often gained using a “SQL injection attack.” SQL, or Structured Query Language, is a type of programming language designed to manage data held in particular types of databases. The hackers allegedly identified vulnerabilities in SQL databases and used those vulnerabilities to infiltrate a computer network. Once the network was infiltrated, the defendants allegedly placed malicious code, or malware, on the system. This malware created a “back door,” leaving the system vulnerable and helping the defendants maintain access to the network. In some cases, the defendants lost access to the system due to companies’ security efforts, but were allegedly able to regain access through persistent attacks.

Instant message chats obtained by law enforcement reveal that the defendants allegedly targeted the victim companies for many months, waiting patiently as their efforts to bypass security were underway, sometimes leaving malware implanted for more than a year.

The defendants allegedly used their access to the networks to install “sniffers,” which were programs designed to identify, collect and steal data from the victims’ computer networks. The defendants then allegedly used an array of computers located around the world to store the stolen data and ultimately sell it to others.

Selling the Data

After acquiring the card numbers and associated data—which they referred to as “dumps”—the conspirators allegedly sold it to resellers around the world. The buyers then sold the dumps through online forums or directly to individuals and organizations. Smilianets was allegedly in charge of sales, selling the data only to trusted identity theft wholesalers. He allegedly charged approximately $10 for each stolen American credit card number and associated data, approximately $50 for each European credit card number and associated data and approximately $15 for each Canadian credit card number and associated data, offering discounted pricing to bulk and repeat customers. Ultimately, the end users encoded each dump onto the magnetic strip of a blank plastic card and cashed out the value of the dump by either withdrawing money from ATMs or making purchases with the cards.

Covering Their Tracks

The defendants allegedly used a number of methods to conceal the scheme. Rytikov allegedly allowed his clients to hack with the knowledge he would never keep records of their online activities or share information with law enforcement.

Over the course of the conspiracy, the defendants allegedly communicated through private and encrypted communications channels to avoid detection. Fearing law enforcement would intercept even those communications, some of the conspirators allegedly attempted to meet in person.

To protect against detection by the victim companies, the defendants allegedly altered the settings on victim company networks to disable security mechanisms from logging their actions. The defendants also allegedly worked to evade existing protections by security software.

As a result of the scheme, financial institutions, credit card companies and consumers suffered hundreds of millions in losses—including more than $300 million in losses reported by just three of the corporate victims—and immeasurable losses to the identity theft victims in costs associated with stolen identities and false charges.

The charges and allegations contained indictments are merely accusations and the defendants are presumed innocent unless and until proven guilty.

The ongoing investigation is being conducted by the U.S. Secret Service. The case is being prosecuted by Trial Attorney Rick Green of the Criminal Division’s Computer Crime and Intellectual Property Section, Chief Gurbir S. Grewal of the District of New Jersey’s Economic Crimes Unit, and Assistant U.S. Attorney Andrew S. Pak of the Computer Hacking and Intellectual Property Section of the District of New Jersey’s Economic Crimes Unit.

The Criminal Division’s Office of International Affairs assisted with the case, as did public prosecutors with the Dutch Ministry of Security and Justice and the National High Tech Crime Unit of the Dutch National Police.

Drinkman et al Indictment

About FREDERICA CADE

Most of the information you will see comes from some Federal/state Government documents or Federal/State Governm Agency. -----------------------------------------------The fellow that can only see a week ahead is always the popular fellow, for he is looking with the crowd. But the one that can see years ahead, he has a telescope but he can't make anybody believe that he has it. ~~~~Will Rogers __The woman who follows the crowd will usually go no further than the crowd. The woman who walks alone is likely to find herself in places no one has ever been before.~ Albert Einstein ~"I never work better than when I am inspired by anger; for when I am angry, I can write, pray, and preach well, for then my whole temperament is quickened, my understandingsharpen​ed, and all mundane vexations and temptations depart.” ~Dr. Martin Luther King Jr. _________________________________________________________________________________________ ~"The bosom of America is open to receive not only the Opulent and respectable Stranger, but the oppressed and persecuted of all Nations and Religions; whom we shall welcome to a participation of all our rights and privileges, if by decency and propriety of conduct they appear to merit the enjoyment".~___________________________________ George Washington, Address to the Members of the Volunteer Association of Ireland, December 2, 1783 Fredericacade@gmail.com

Discussion

No comments yet.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Blog Stats #

  • 980,883 hits

Frederica Cade’s Archives

Recent Post

February 2015
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Politics, local News, National News, Foreign news, Congress, President, Government, Economics, Analysis, Art, Health,Investigation, FBI, Justice Department, Fraud, Press Releases, Health Care, News Releases, Law, and History Tags

2012 Elections Affordable Care Act Alabama Albuquerque ALEC Alexandria American Legislative Exchange Council AMERICAN LEGISLATIVE EXCHANGE COUNCIL (ALEC) Analysis Arizona Atlanta Attorney General Eric Holder California charter schools Chicago Congress Connecticut Democrats Deputy Attorney General James M. Cole Donald Trump Economics Economy Education Environ Environme Environmen Environment EPA FBI Federal Election Commission (FEC) Florida fraud FreedomWorks General Georgia Governor Nikki Haley Grover Norquist Hammond Health Health Care Heritage Foundation HHS Secretary Kathleen Sebelius Hillary Clinton History https://fredericacade.wordpress.com https://fredericacade.wordpress.com/wp-admin/edit.php?category_name=politics-congress-investigation-republicans-fbi-internet-health-economy-education-wikipedia-local-news-press-release-justice-departm Idaho Illinois Inc. Indiana Internet Investigation Iowa IRS jobs Jr. Justice Department Kansas Kara Pally Keystone XL Knoxville Koch Koch Brothers Koch Industries Laws local news Louisiana Maryland Massachusetts Matte Kibbe Memphis meta Miami Michigan Minnesota Mississippi Missouri Mitt Romney Montana Nashville National News Nebraska New Jersey New Mexico News New York Nikki Haley North Carolina Ohio Oklahoma Oregon outsourcing Paul Ryan Pennsylvania Philadelphia Politics President President Obama Press Release Public Schools Puerto Rico record Republicans Rhode Island South Carolina South Dakota Sr. Tennessee Texas Top Story TransCanada Vincent Sheheen Virginia Voting Rights Act Voting Rights Act of 1965 WASHINGTON Washington D.C. West Virginia Wikipedia Wisconsin

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)