Feeds

Feds charge pump and dump hacker

Funds spree with compromised accounts

Choosing a cloud hosting partner with confidence

Federal authorities brought securities fraud charges against a man they allege made more than $82,000 in a six-week scheme that used compromised trading accounts to drive up the price of thinly-traded stocks.

Aleksey Kamardin, a 21-year-old with an address in Tampa, Fla., bought the shares using an E*Trade account and then caused hi-jacked client accounts with online brokerages to buy large blocks of the same stock, according to a complaint filed by the Securities and Exchange Commission. With the share price inflated as a result of the activity, Kamardin then sold the holdings in his E*Trade account, enabling him to realizes a handsome profit.

Such pump and dump schemes have been proliferating in recent years, usually through the use of viruses targeting the computers of online stock traders. Once a trader's machine has been owned, the criminal uses the account to manipulate the price of penny stocks.

Kamardin's spree ran from July 13 to Aug. 25 and affected 17 different stocks, including those of Gales Industries (ticker: GLDS), Fuego Entertainment (FUGO), and Butler National (BUKS). In the case of Gales, Kamardin purchased 55,000 shares on the morning of Aug. 25 for 50 cents to 55 cents, caused a compromised account maintained by TD Ameritrade to buy 245,000 shares, and then dumped his initial investment at 66 cents a share, yielding more than $7,000 in profit.

Not bad work if you can get it, we'd be tempted to say, except that this type of scheme is preposterously easy for the Feds to track. Gales's trading volume on the day in question was 533,400, compared with a 15-day average of 20,756. Kamardin's trades, which accounted for some 20 per cent of that activity, must have stuck out like a sore toe.

Which is perhaps why the boy genius, over two days in late August, had to wire his ill-gotten gains to a domestic bank account, transfer them into a second account maintained by a Russian-born roommate, relay them into an account located in Latvia and escape to Russia.

Still, when you live in a country where the per capita gross domestic product is one-fourth of that in the US, $82,000 will buy you plenty of Piroshkis - even if you have to look over your shoulder while chewing. ®

Beginner's guide to SSL certificates

More from The Register

next story
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.