Featured Articles

HP Stream is a Chromebook killer priced at $200

HP Stream is a Chromebook killer priced at $200

We have been hearing reports of a new breed of affordable Windows notebooks for months. It is alleged that a number…

More...
AMD Radeon R7 SSD line-up goes official

AMD Radeon R7 SSD line-up goes official

AMD has officially launched its first ever SSDs and all three are part of AMD’s AMD Radeon R7 SSD series.

More...
KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 14 April 2014 11:05

US government takes out Zeus gang

Written by Nick Farrell



Hades hath no fury

The US Department of Justice has charged nine members of a group that used Zeus malware to infect thousands of business computers. The cunning plan was to illegally siphon-off millions of dollars into overseas bank accounts, as opposed to the Apple and Google, which did this sort of thing legally.

Two Ukrainian nationals, Yuriy Konovalenko, 31, and Yevhen Kulibaba, 36 are in the dock. Konovalenko and Kulibaba were extradited from the United Kingdom. All of the defendants had been charged by a federal grand jury in August 2012 with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud. Court documents said that the defendants participated in an enterprise and scheme that installed the Zeus or "Zbot" on computers connected to the Bank of America, First National Bank of Omaha, Nebraska, the Franciscan Sisters of Chicago and Key Bank.

They nicked bank account numbers, passwords, personal identification numbers, RSA SecureID token codes and similar information necessary to log into online banking accounts. They then falsely represented to banks that they were employees of the victims and authorized to make transfers of funds from the victims' bank accounts, causing the banks to make unauthorized transfers of funds from the victims' accounts, the DoJ stated.

The defendants used US residents as "money mules" who received funds transferred over the Automated Clearing House network or through other interstate wire systems from victims' bank accounts. They then wired the cash overseas to the conspirators. Kulibaba allegedly operated the conspirators' money laundering network in the United Kingdom by providing money mules and their associated banking credentials to launder the money withdrawn from US-based accounts.

Konovalenko allegedly provided money mules' and victims' banking credentials to Kulibaba and facilitated the collection of victims' data from other conspirators. Four identified defendants have not been arrested. Three of them are from the Ukraine and one is from Russia. There are three others who have not been identified yet.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments