Skip to main content

Aleksei Burkov Pleads Guilty for running Online Criminal Marketplace


Story: Aleksei Burkov, 29 of St. Petersburg, Russia, has pleaded guilty in a US court to running a site that sold stolen payment card data and administering a highly secretive crime forum that counted among its members, some of the most elite Russian cybercrooks.

More Detail: Aleksei, who was extradited to the US from Israel in November, pleaded guilty on Thursday to running a website that helped people commit in credit-card fraud. He is accused of running a website that let people buy stolen credit-card numbers for anywhere from $3 to $60. People used the numbers to make more than $20 million in fraudulent purchases. Prosecutors say Burkov even offered a money-back guarantee if a stolen card number no longer worked. 

Company: Aleksei admitted to running CardPlanet, a site that sold more than 150,000 stolen credit card accounts, and to being the founder and administrator of DirectConnection, an underground community that attracted some of the world’s most-wanted Russian hackers. 

What did he plead guilty to? Access device fraud and conspiracy to commit computer intrusion, identity theft, wire fraud and money laundering.

Sentence: He faces a prison sentence of up to 15 years at his May 8 2020 sentencing.

More detail on this can be found at KrebsonSecurity

Comments

Popular posts from this blog

Yahoo Data Breach #ICOiscoming #NewChiefInTown #Yahoo

The new Information Commissioner, Elizabeth Denham, has revealed that the ICO is questioning Yahoo about its catastrophic data breach, and is looking to probe WhatsApp and other Facebook-owned companies over how they share data with one another. In her first speech as Information Commissioner, Denham said that the ICO would be choosing its investigations carefully to ensure they are relevant to the general public. Last Friday, the ICO had stepped in to ask questions about the Yahoo data breach, which involved eight million UK accounts. "The data breach is unprecedented. The numbers are staggering," Denham told BBC Radio 4, in a subsequent interview. "Why did it take so long for Yahoo to notify the public of the breach? It looks like it happened two years ago. What can these account holders do to protect themselves? "I'm asking those questions on behalf of UK citizens," she said. Cited and more information at  Computing

Human Error, a common theme in the ICO data breach findings #UK #ICO

The ICO recently carried out a study of the recent security incidents that have been reported or notified to the ICO. It's no shock that data breaches are on the rise with two-thirds of sectors studied reporting an increase in the first quarter compared with the same time a year ago, according to new ICO figures. The data protection watchdog, ICO have shown findings for the period 1 January – 31 March 2016 and uncovered some worrying statistics. Below are the key data security issues for each sector:  Data security incidents by type: The main data security issues within the health sector were: Data being posted or faxed to an incorrect recipient – 22% of incidents. Loss or theft of paperwork – 20% of incidents. The main issues for local government were: Data being posted or faxed to an incorrect recipient – 23% of incidents. Failure to redact data – 16% of incidents. Loss of theft of paperwork – 14% of incidents. The main issues for education were: Los...

Time to get serious in 2015

Security professionals are faced with the on-going problem of stakeholders under-estimating the security flaws within their organisation. In most cases this is not the failing of the security team but depending on the market/vertical, teams are faced with budget constraints, redundancies, or most commonly, companies not taking responsibility that Security starts within. This means educating internal staff to take responsibility from the moment they walk into the office; I.e. The devices they bring, the doors that they open to 'guests',  the confidential conversations they have in open areas and the general ethos. Furthermore, there is the responsibility of your key suppliers and other third parties that you share information with.  You may have all the IT/Cyber security gadgets and resources you need but what are your suppliers doing with that data? Do they share the same vision for security and are they as vigilant as you? How do you measure that in an effici...