Feeds

5 men named in racket that netted $4m in stolen card data

All aboard the Western Express Cybercrime Group

The Power of One eBook: Top reasons to choose HP BladeSystem

Prosecutors in Manhattan have named five additional men from Eastern Europe in an alleged scheme that pilfered $4m using more than 95,000 stolen credit cards.

Using handles such as "the Viver," "Inexwor," and "DoZ," the men were part of an international conspiracy that reached half-way around the world to snatch the payment card credentials of people located in New York, according to prosecutors in Manhattan District Attorney's office. They branded their highly profitable enterprise the Western Express Cybercrime Group.

The charges were originally filed in November 2007 in a 173-count indictment that charged 17 individuals and one corporation. It claimed that from 2001 to 2007, the defendants made millions of dollars trafficking stolen card numbers through a complex syndicate that included cybercrime services providers and money mules to sell stolen merchandise over eBay.

They employed anonymous digital currencies such as Egold and Webmoney to cover their tracks and placed ads on underground carding forums, according to prosecutors.

Defendants Viatcheslav Vasilyev, 33, and Vladimir Kramarenko, 31, were arrested simultaneously at their residences in Prague, Czech Republic in July 2008, and extradited to the US last week, district-attorney officials said Monday. The men allegedly bought stolen card numbers for the purposes of committing larcenies and identity theft. Part of their scheme involved a website named Elgouna Ltd., which recruited individuals to sell stolen merchandise online, according to the district attorney's office.

They are scheduled to be arraigned Tuesday in New York state court.

Egor Shevelev, 23, of Ukraine, was arrested in May 2008 while vacationing in Greece. He possessed more than 75,000 stolen account numbers and laundered over $600,000 in illegal proceeds, prosecutors said. He has not yet been extradited to the US.

The two remaining defendants have not been apprehended. They are Dzimitry Burak, aka Leon Kurochkin, a 26-year-old living in Ukraine, and Oleg Kovelin, aka Oleg Covelin, a 28-year-old from Moldova.

The case stems from a four-year investigation carried out jointly by the Manhattan District Attorney's Identity Theft Unit an the US Secret Service.

An attorney for Vasilyev told The New York Times that her client owned a legitimate web design business in Prague and planned to plead not guilty. An attorney for Kramarenko said he planned to vigorously contest the charges.

A spokeswoman said the Manhattan District Attorney's office doesn't provide electronic copies of indictments, but offered to mail a hard copy. A press release is available here. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.