troubledwaters8
FPS Strategist
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 2
1000 XP
FBI ~ 10 MOST WANTED CYBERCRIMINALS
1.Evgeniy Mikhailovich Bogachev
Charged with: Conspiracy to Participate in Racketeering Activity; Bank Fraud; Conspiracy to Violate the Computer Fraud and Abuse Act; Conspiracy to Violate the Identity Theft and Assumption Deterrence Act; Aggravated Identity Theft; Conspiracy
Bogachev, using the online monikers “lucky12345†and “slavikâ€, is wanted for his alleged involvement in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as “Zeus†on victims’ computers. The software was used to capture bank account numbers, passwords, personal identification numbers, and other information necessary to log into online banking accounts.
Starting in September of 2011, the FBI began investigating a modified version of the Zeus Trojan, known as Gameover Zeus (GOZ). It is believed GOZ is responsible for more than one million computer infections, resulting in financial losses in the hundreds of millions of dollars.
Reward : Up to $3.000.000
2.Sun Kailiang
Charged with: 31 counts, including Conspiring to Commit Computer Fraud; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging Computers Through the Transmission of Code and Commands; Aggravated Identity Theft
On May 1, 2014, a grand jury indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts, including the above, plus aggravated identity theft; economic espionage; and theft of trade secrets.
The subjects, including Sun Kailiang, were officers of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau, Third Office, Military Unit Cover Designator (MUCD) 61398, at some point during the investigation.
3.Huang Zhenyu
Charged with: Conspiring to Commit Computer Fraud; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging Computers
Reward: The FBI is offering a reward of up to $50,000 for information leading to his arrest.
On May 1, 2014, a grand jury indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts. The activities executed by each of these individuals allegedly involved in the conspiracy varied according to their specific specialties.
Each person provided his individual expertise to an alleged conspiracy to penetrate the computer networks of six American companies while those companies were engaged in negotiations or joint ventures or were pursuing legal action with, or against, state-owned enterprises in China. They then used their illegal access to allegedly steal proprietary information including, for instance, e-mail exchanges among company employees and trade secrets related to technical specifications for nuclear plant designs. Huang was a computer programmer who managed the domain accounts used by the others.
4. Wen Xinyu
Charged with: Conspiring to Commit Computer Fraud; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging Computers Through the Transmission of Code and Commands; Aggravated Identity Theft
A judge indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts. The subjects, including Wen Xinyu, were officers of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau,
5. Wang Dong
Charged with: Conspiring to Commit Computer Fraud; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging Computers Through the Transmission of Code and Commands; Aggravated Identity Theft
Dong was an officer of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau, Third Office, Military Unit Cover Designator (MUCD) 61398. The activities executed allegedly involved in the conspiracy varied according to his specialties. Each provided his individual expertise to an alleged conspiracy to penetrate the computer networks of six American companies while those companies were engaged in negotiations or joint ventures or were pursuing legal action with, or against, state-owned enterprises in China. They then used their illegal access to allegedly steal proprietary information including, for instance, e-mail exchanges among company employees and trade secrets related to technical specifications for nuclear plant designs. Wang controlled victim computers.
6. Abberzeus Subjects
Charged with: Conspiracy to Participate in Racketeering Activity; Bank Fraud; Conspiracy to Violate the Computer Fraud and Abuse Act; Conspiracy to Violate the Identity Theft and Assumption Deterrence Act; and Aggravated Identity Theft
These individuals, thought to be located in Russia and Ukraine, were involved in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as “Zeus†on victims’ computers.
7. Bjorn Daniel Sundin
Charged with: Wire Fraud; Conspiracy to Commit Computer Fraud; Computer Fraud
Reward: The FBI is offering a reward of up to $20,000
Sundin, along with his co-conspirator, Shaileshkumar P. Jain, is wanted for his alleged involvement in an international cybercrime scheme that caused internet users in more than 60 countries to purchase more than one million bogus software products, resulting in consumer loss of more than $100 million.
Sundin and his co-conspirators deceived victims, through browser hijacking, multiple fraudulent scams and false error messages, into purchasing full paid versions of software products offered by their company, Innovative Marketing, Inc. The proceeds of these credit card sales were allegedly deposited into bank accounts controlled by the defendant and others around the world, and were then transferred to bank accounts located in Europe. When customers complained that their purchases were actually fraudulent software, call center representatives were allegedly instructed to lie or provide refunds in order to prevent fraud reports to law enforcement or credit companies.
8. Alexandr Sergeyvich Bobnev
Charged with: Conspiracy to Commit Wire Fraud; Conspiracy to Commit Money Laundering
Reward: $50,000
Bobnev was indicted for his alleged participation in a money laundering scheme involving unauthorized access to the accounts of a major provider of investment services. He allegedly accessed compromised accounts and wire transferred funds out of these accounts to money mules in the United States. These mules were then responsible for transferring the money back to Bobnev.
Between June of 2007 and August of 2007, Bobnev allegedly wired or attempted to wire over $350,000 from compromised accounts.
9.Carlos Enrique Perez-Melara
Charged with: Manufacturing a surreptitious interception device; sending a surreptitious interception device; advertising a surreptitious interception device; unlawfully intercepting electronic communications; disclosing unlawfully intercepted electronic communications; unauthorized access to protected computer for financial gain; and aiding and abetting
Reward: $50,000
Perez-Melara is wanted for his alleged involvement in manufacturing spyware, which was used to intercept the private communications of hundreds, if not thousands, of victims. As part of the scheme, he ran a website offering customers a way to “catch a cheating lover†by sending spyware masqueraded as an electronic greeting card. Victims who opened the greeting card would unwittingly install a program onto their computers.
The program collected keystrokes and other incoming and outgoing electronic communications on the victims’ computers. The program would periodically send e-mail messages back to the purchasers of the service containing the acquired communications, including the victims’ passwords, lists of visited websites, intercepted e-mail messages, and keystroke logs.
10. Andrey Nabilevich Taame
Charged with: Conspiracy to Commit Wire Fraud; Conspiracy to Commit Computer-Related Fraud (Computer Intrusion); Wire Fraud; Computer Intrusion
Reward: The FBI is offering a reward of up to $50,000 for information leading to his capture.
Taame is wanted for his alleged involvement in the unauthorized infection of malware on over four million computers located in more than 100 countries, which includes at least 500,000 victims in the United States, from approximately 2007 to October of 2011.
This malware changed the infected computers’ Domain Name System (DNS) settings so that the infected computers did not connect to the user’s Internet Service Provider’s (ISP) server, but instead connected to fraudulent servers that Taame’s co-conspirators controlled. These fraudulent servers then converted the domain names to the wrong IP addresses and redirected the infected computer to websites the user of the infected computer did not intend to visit. This allowed Taame to hijack Internet traffic for the purpose of online advertising fraud.
1.Evgeniy Mikhailovich Bogachev
Loading…
i2.wp.com
Bogachev, using the online monikers “lucky12345†and “slavikâ€, is wanted for his alleged involvement in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as “Zeus†on victims’ computers. The software was used to capture bank account numbers, passwords, personal identification numbers, and other information necessary to log into online banking accounts.
Starting in September of 2011, the FBI began investigating a modified version of the Zeus Trojan, known as Gameover Zeus (GOZ). It is believed GOZ is responsible for more than one million computer infections, resulting in financial losses in the hundreds of millions of dollars.
Reward : Up to $3.000.000
2.Sun Kailiang
Loading…
i1.wp.com
On May 1, 2014, a grand jury indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts, including the above, plus aggravated identity theft; economic espionage; and theft of trade secrets.
The subjects, including Sun Kailiang, were officers of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau, Third Office, Military Unit Cover Designator (MUCD) 61398, at some point during the investigation.
3.Huang Zhenyu
Loading…
i1.wp.com
Reward: The FBI is offering a reward of up to $50,000 for information leading to his arrest.
On May 1, 2014, a grand jury indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts. The activities executed by each of these individuals allegedly involved in the conspiracy varied according to their specific specialties.
Each person provided his individual expertise to an alleged conspiracy to penetrate the computer networks of six American companies while those companies were engaged in negotiations or joint ventures or were pursuing legal action with, or against, state-owned enterprises in China. They then used their illegal access to allegedly steal proprietary information including, for instance, e-mail exchanges among company employees and trade secrets related to technical specifications for nuclear plant designs. Huang was a computer programmer who managed the domain accounts used by the others.
4. Wen Xinyu
Loading…
i1.wp.com
A judge indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts. The subjects, including Wen Xinyu, were officers of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau,
5. Wang Dong
Loading…
i1.wp.com
Dong was an officer of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau, Third Office, Military Unit Cover Designator (MUCD) 61398. The activities executed allegedly involved in the conspiracy varied according to his specialties. Each provided his individual expertise to an alleged conspiracy to penetrate the computer networks of six American companies while those companies were engaged in negotiations or joint ventures or were pursuing legal action with, or against, state-owned enterprises in China. They then used their illegal access to allegedly steal proprietary information including, for instance, e-mail exchanges among company employees and trade secrets related to technical specifications for nuclear plant designs. Wang controlled victim computers.
6. Abberzeus Subjects
Loading…
i1.wp.com
These individuals, thought to be located in Russia and Ukraine, were involved in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as “Zeus†on victims’ computers.
7. Bjorn Daniel Sundin
Loading…
i0.wp.com
Reward: The FBI is offering a reward of up to $20,000
Sundin, along with his co-conspirator, Shaileshkumar P. Jain, is wanted for his alleged involvement in an international cybercrime scheme that caused internet users in more than 60 countries to purchase more than one million bogus software products, resulting in consumer loss of more than $100 million.
Sundin and his co-conspirators deceived victims, through browser hijacking, multiple fraudulent scams and false error messages, into purchasing full paid versions of software products offered by their company, Innovative Marketing, Inc. The proceeds of these credit card sales were allegedly deposited into bank accounts controlled by the defendant and others around the world, and were then transferred to bank accounts located in Europe. When customers complained that their purchases were actually fraudulent software, call center representatives were allegedly instructed to lie or provide refunds in order to prevent fraud reports to law enforcement or credit companies.
8. Alexandr Sergeyvich Bobnev
Loading…
i0.wp.com
Reward: $50,000
Bobnev was indicted for his alleged participation in a money laundering scheme involving unauthorized access to the accounts of a major provider of investment services. He allegedly accessed compromised accounts and wire transferred funds out of these accounts to money mules in the United States. These mules were then responsible for transferring the money back to Bobnev.
Between June of 2007 and August of 2007, Bobnev allegedly wired or attempted to wire over $350,000 from compromised accounts.
9.Carlos Enrique Perez-Melara
Loading…
i0.wp.com
Reward: $50,000
Perez-Melara is wanted for his alleged involvement in manufacturing spyware, which was used to intercept the private communications of hundreds, if not thousands, of victims. As part of the scheme, he ran a website offering customers a way to “catch a cheating lover†by sending spyware masqueraded as an electronic greeting card. Victims who opened the greeting card would unwittingly install a program onto their computers.
The program collected keystrokes and other incoming and outgoing electronic communications on the victims’ computers. The program would periodically send e-mail messages back to the purchasers of the service containing the acquired communications, including the victims’ passwords, lists of visited websites, intercepted e-mail messages, and keystroke logs.
10. Andrey Nabilevich Taame
Loading…
i1.wp.com
Reward: The FBI is offering a reward of up to $50,000 for information leading to his capture.
Taame is wanted for his alleged involvement in the unauthorized infection of malware on over four million computers located in more than 100 countries, which includes at least 500,000 victims in the United States, from approximately 2007 to October of 2011.
This malware changed the infected computers’ Domain Name System (DNS) settings so that the infected computers did not connect to the user’s Internet Service Provider’s (ISP) server, but instead connected to fraudulent servers that Taame’s co-conspirators controlled. These fraudulent servers then converted the domain names to the wrong IP addresses and redirected the infected computer to websites the user of the infected computer did not intend to visit. This allowed Taame to hijack Internet traffic for the purpose of online advertising fraud.