Feeds

5 men named in racket that netted $4m in stolen card data

All aboard the Western Express Cybercrime Group

Using blade systems to cut costs and sharpen efficiencies

Prosecutors in Manhattan have named five additional men from Eastern Europe in an alleged scheme that pilfered $4m using more than 95,000 stolen credit cards.

Using handles such as "the Viver," "Inexwor," and "DoZ," the men were part of an international conspiracy that reached half-way around the world to snatch the payment card credentials of people located in New York, according to prosecutors in Manhattan District Attorney's office. They branded their highly profitable enterprise the Western Express Cybercrime Group.

The charges were originally filed in November 2007 in a 173-count indictment that charged 17 individuals and one corporation. It claimed that from 2001 to 2007, the defendants made millions of dollars trafficking stolen card numbers through a complex syndicate that included cybercrime services providers and money mules to sell stolen merchandise over eBay.

They employed anonymous digital currencies such as Egold and Webmoney to cover their tracks and placed ads on underground carding forums, according to prosecutors.

Defendants Viatcheslav Vasilyev, 33, and Vladimir Kramarenko, 31, were arrested simultaneously at their residences in Prague, Czech Republic in July 2008, and extradited to the US last week, district-attorney officials said Monday. The men allegedly bought stolen card numbers for the purposes of committing larcenies and identity theft. Part of their scheme involved a website named Elgouna Ltd., which recruited individuals to sell stolen merchandise online, according to the district attorney's office.

They are scheduled to be arraigned Tuesday in New York state court.

Egor Shevelev, 23, of Ukraine, was arrested in May 2008 while vacationing in Greece. He possessed more than 75,000 stolen account numbers and laundered over $600,000 in illegal proceeds, prosecutors said. He has not yet been extradited to the US.

The two remaining defendants have not been apprehended. They are Dzimitry Burak, aka Leon Kurochkin, a 26-year-old living in Ukraine, and Oleg Kovelin, aka Oleg Covelin, a 28-year-old from Moldova.

The case stems from a four-year investigation carried out jointly by the Manhattan District Attorney's Identity Theft Unit an the US Secret Service.

An attorney for Vasilyev told The New York Times that her client owned a legitimate web design business in Prague and planned to plead not guilty. An attorney for Kramarenko said he planned to vigorously contest the charges.

A spokeswoman said the Manhattan District Attorney's office doesn't provide electronic copies of indictments, but offered to mail a hard copy. A press release is available here. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.