Showing posts sorted by date for query Department of Justice. Sort by relevance Show all posts
Showing posts sorted by date for query Department of Justice. Sort by relevance Show all posts

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York 

Yet again another serious issue of cyber crime get resolved when the FBI tracked and figured out the master mind of infamous 'Gozi banking Trojan' which effected more than millions of system world wide, including a handful at NASA, leading to tens of millions of dollars in lost banking funds and damages to computer systems and networks. Three alleged international cyber criminals from Russia, responsible for creating and distributing 'Gozi' that infected over one million computers and caused tens of millions of dollars in losses charged in Manhattan Federal Court. Mihai Ionut Paunescu aged 28, a Romanian, Deniss Calovskis, 27, a Latvian, and Nikita Vladimirovich Kuzmin, 25, of the Russian Federation, are charged with computer intrusion, conspiracy to commit bank and wire fraud and access device fraud. Federal authorities said the three were arrested last week; Kuzmin is being held in New York, while Paunescu is in custody in Romania and Calovskis in Latvia. 
According to the press release of FBI -Deniss Calovskis, a/k/a “Miami,” a Latvian national who allegedly wrote some of the computer code that made the Gozi virus so effective, was arrested in Latvia in November 2012. Mihai Ionut Paunescu, a/k/a “Virus,” a Romanian national who allegedly ran a “bulletproof hosting” service that enabled cyber criminals to distribute the Gozi virus, the Zeus trojan, and other notorious malware and to conduct other sophisticated cyber crimes, was arrested in Romania in December 2012. 

The cases are being handled by the Complex Frauds Unit of the United States Attorney’s Office. Assistant United States Attorneys Sarah Lai, Nicole Friedlander, and Thomas G.A. Brown, along with Trial Attorney Carol Sipperly of the Computer Crime and Intellectual Property Section of the Department of Justice on the Paunescu case, are in charge of the prosecution. The charges contained in the Indictments are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

DefendantAge and ResidenceChargesMaximum Penalty
Nikita Kuzmin25; Moscow, RussiaConspiracy to commit bank fraud; bank fraud; conspiracy to commit access device fraud; access device fraud; conspiracy to commit computer intrusion; computer intrusion95 years in prison
Deniss Calovskis27; Riga, LatviaConspiracy to commit bank fraud; conspiracy to commit access device fraud; conspiracy to commit computer intrusion; conspiracy to commit wire fraud; conspiracy to commit aggravated identity theft67 years in prison
Mihai Ionut Paunescu28; Bucharest, RomaniaConspiracy to commit computer intrusion; conspiracy to commit bank fraud; conspiracy to commit wire fraud60 years in prison


Brief About Gozi:-
The Gozi virus is malicious computer code, or “malware,” that steals personal bank account information, including usernames and passwords, from the users of affected computers. It was named by private sector information security experts in the U.S. who, in 2007, discovered that previously unrecognized malware was stealing personal bank account information from computers across Europe on a vast scale, while remaining virtually undetectable in the computers it infected. To date, the Gozi virus has infected over one million victim computers worldwide, among them at least 40,000 computers in the U.S., including computers belonging to the National Aeronautics and Space Administration (NASA), as well as computers in Germany, Great Britain, Poland, France, Finland, Italy, Turkey, and elsewhere, and it has caused tens of millions of dollars in losses to the individuals, businesses, and government entities whose computers were infected.

The Gozi virus was distributed to victims’ computers in several different ways. In one method, the virus was disguised as an apparently benign .pdf document which, when opened, secretly installed the Gozi virus on the victim’s computer. Once installed, the Gozi virus—which was intentionally designed to be undetectable by anti-virus software—collected data from the infected computer in order to capture personal bank account information including usernames and passwords. That data was then transmitted to various computer servers controlled by the cyber criminals who used the Gozi virus. These cyber criminals then used the personal bank account information to transfer funds out of the victims’ bank accounts and ultimately into their own personal possession.


For Detailed Information Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacked MIT Website & Left Tribute Message For Aaron Swartz

Anonymous Hacked MIT Website & Left Tribute Message For Aaron Swartz

We have just passed a few days when the shocking news of Aaron Swartz's suicide take down the entire Internet and specially the cyber world. Swartz, a political activist and computer programmer, reportedly hanged himself last week in his Brooklyn apartment as he awaited trial on 13 felony counts for downloading and publishing roughly 4 million academic journal articles from the database JSTOR. Hours after the Massachusetts Institute of Technology posted a pledge to investigate its involvement in events associated with the suicide of Aaron Swartz. But this step of MIT was not enough as the hacktivist group Anonymous taken this issue very seriously and started a campaign in which they targeted several websites of MIT. From 4 p.m. to 7:50 p.m. PT on Sunday evening, M.I.T.'s network lost access to most websites, including mit.edu, where Anonymous posted a red-lettered tribute message in Swartz's honor saying -

“Whether or not the government contributed to his suicide, the government’s prosecution of Swartz was a grotesque miscarriage of justice, a distorted and perverse shadow of the justice that Aaron died fighting for — freeing the publicly-funded scientific literature from a publishing system that makes it inaccessible to most of those who paid for it — enabling the collective betterment of the world through the facilitation of sharing — an ideal that we should all support,” 

Kimberly Allen, the media relations manager at M.I.T., did not immediately respond to a call from TheWrap requesting comment.
M.I.T. President Rafael Reif asked computer science professor Hal Abelson on Sunday to "lead a thorough analysis of M.I.T.'s involvement from" in Swartz's case. According to sources The Department of Justice dropped charges against Swartz on Monday, standard policy for when a defendant dies. JSTOR, which said it settled its claims against Swartz in June 2011, said it was "saddened" to hear of his death.
"We extend our heartfelt condolences to Aaron’s family, friends, and everyone who loved, knew, and admired him," it said in a post on its website. "He was a truly gifted person who made important contributions to the development of the internet and the web from which we all benefit."

Here is the full Message of Anonymous posted on MIT's website:-


"In Memoriam, Aaron Swartz, November 8, 1986 – January 11, 2013, Requiescat in pace.
A brief message from Anonymous.
Whether or not the government contributed to his suicide, the government’s prosecution of Swartz was a grotesque miscarriage of justice, a distorted and perverse shadow of the justice that Aaron died fighting for — freeing the publicly-funded scientific literature from a publishing system that makes it inaccessible to most of those who paid for it — enabling the collective betterment of the world through the facilitation of sharing — an ideal that we should all support.
Moreover, the situation Aaron found himself in highlights the injustice of U.S. computer crime laws, particularly their punishment regimes, and the highly-questionable justice of pre-trial bargaining. Aaron’s act was undoubtedly political activism; it had tragic consequences.
Our wishes
  • We call for this tragedy to be a basis for reform of computer crime laws, and the overzealous prosecutors who use them.
  • We call for this tragedy to be a basis for reform of copyright and intellectual property law, returning it to the proper principles of common good to the many, rather than private gain to the few.
  • We call for this tragedy to be a basis for greater recognition of the oppression and injustices heaped daily by certain persons and institutions of authority upon anyone who dares to stand up and be counted for their beliefs, and for greater solidarity and mutual aid in response.
  • We call for this tragedy to be a basis for a renewed and unwavering commitment to a free and unfettered internet, spared from censorship with equality of access and franchise for all.
For in the end, we will not be judged according to what we give, but according to what we keep to ourselves.
Aaron, we will sorely miss your friendship, and your help in building a better world. May you read in peace.
—-
Who was Aaron Swartz? A hero in the SOPA/PIPA campaign, Reddit cofounder, RSS, Demand Progress, Avaaz, etc…:
—-
Guerilla Open Access Manifesto
Information is power. But like all power, there are those who want to keep it for themselves. The world’s entire scientific and cultural heritage, published over centuries in books and journals, is increasingly being digitized and locked up by a handful of private corporations. Want to read the papers featuring the most famous results of the sciences? You’ll need to send enormous amounts to publishers like Reed Elsevier.
There are those struggling to change this. The Open Access Movement has fought valiantly to ensure that scientists do not sign their copyrights away but instead ensure their work is published on the Internet, under terms that allow anyone to access it. But even under the best scenarios, their work will only apply to things published in the future. Everything up until now will have been lost.
That is too high a price to pay. Forcing academics to pay money to read the work of their colleagues? Scanning entire libraries but only allowing the folks at Google to read them? Providing scientific articles to those at elite universities in the First World, but not to children in the Global South? It’s outrageous and unacceptable.
“I agree,” many say, “but what can we do? The companies hold the copyrights, they make enormous amounts of money by charging for access, and it’s perfectly legal — there’s nothing we can do to stop them.” But there is something we can, something that’s already being done: we can fight back.
Those with access to these resources — students, librarians, scientists — you have been given a privilege. You get to feed at this banquet of knowledge while the rest of the world is locked out. But you need not — indeed, morally, you cannot — keep this privilege for yourselves. You have a duty to share it with the world. And you have: trading passwords with colleagues, filling download requests for friends.
Meanwhile, those who have been locked out are not standing idly by. You have been sneaking through holes and climbing over fences, liberating the information locked up by the publishers and sharing them with your friends.
But all of this action goes on in the dark, hidden underground. It’s called stealing or piracy, as if sharing a wealth of knowledge were the moral equivalent of plundering a ship and murdering its crew. But sharing isn’t immoral — it’s a moral imperative. Only those blinded by greed would refuse to let a friend make a copy.
Large corporations, of course, are blinded by greed. The laws under which they operate require it — their shareholders would revolt at anything less. And the politicians they have bought off back them, passing laws giving them the exclusive power to decide who can make copies.
There is no justice in following unjust laws. It’s time to come into the light and, in the grand tradition of civil disobedience, declare our opposition to this private theft of public culture.
We need to take information, wherever it is stored, make our copies and share them with the world. We need to take stuff that’s out of copyright and add it to the archive. We need to buy secret databases and put them on the Web. We need to download scientific journals and upload them to file sharing networks. We need to fight for Guerilla Open Access.
With enough of us, around the world, we’ll not just send a strong message opposing the privatization of knowledge — we’ll make it a thing of the past. Will you join us?
Aaron Swartz
July 2008, Eremo, Italy
—–
You were the best of us; may you yet bring out the best in us.
-Anonymous, Jan 13, 2013.
—-
(Postscript: We tender apologies to the administrators at MIT for this temporary use of their websites. We understand that it is a time of soul-searching for all those within this great institution as much — perhaps for some involved even more so — than it is for the greater internet community. We do not consign blame or responsibility upon MIT for what has happened, but call for all those feel heavy-hearted in their proximity to this awful loss to acknowledge instead the responsibility they have — that we all have — to build and safeguard a future that would make Aaron proud, and honour the ideals and dedication that burnt so brightly within him by embodying them in thought and word and action..."


VOGH Reaction:- There is nothing much to say, we are speechless after what happened. Swartz suicide is surely a defeat of freedom. Last but not least VOGH team along with the whole cyber world will miss Aaron Swartz, RIP!


-Source (TC & Wired)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

Infamous NASA hacker Gary McKinnon who broke into US government computer system, while hunting for evidence of UFOs and fought a long fight against extradition, has been told that he will now not face prosecution in the UK. After discussing the case with US Department of Justice and the police, The Crown Prosecution Service (CPS) has decided the appropriate jurisdiction for the McKinnon case to be heard is the US. According to Karen Todner, McKinnon's solicitor, the decision on Friday is an "interesting" one given that he was first arrested and questioned by UK police.

The reasons for that decision were:
  1. The harm occurred in the US - the activity was directed against the military infrastructure of the US;
  2. An investigation had already been launched in the US;
  3. There were a large number of witnesses, most of whom were located in the US;
  4. All of the physical evidence (with the exception of Mr McKinnon's computer) was located in the US;
  5. The US prosecutors were able to bring a case that reflected the full extent of Mr McKinnon's alleged criminality; and
  6. The bulk of the unused material was located in the US. Given the nature of the offences, this inevitably included highly sensitive information and the US courts were best placed to deal with any issues arising in relation to this material.

In a statement, the CPS's Director of Public Prosecutions (DPP), Kier Starmer QC, and Mark Rowley, Assistant Commissioner of the Metropolitan Police Service, said that they had convened a joint panel to discuss the issue and decide whether a new criminal investigation should take place. They decided that the original reasoning for the trial being held in the US still held, and looked into the possibility of holding the trial in the UK. This would have involved transferring witnesses and sensitive physical evidence to the UK. The panel consulted with the US Department of Justice as to whether this would be possible, given that they believed that "the prospects of a conviction against Mr McKinnon, which reflects the full extent of his alleged criminality, are not high".
According to the statement, the US authorities "indicated to us that they would be willing to co-operate with a prosecution in England and Wales if that would serve the interests of justice." However, the US authorities did not feel that transferring all the witnesses and evidence to the UK would be in that interest, given the panel's representations. The statement goes on to say: "That is a decision the US authorities are fully entitled to reach and we respect their decision." On that basis, the panel concluded that a new criminal investigation should not be started and the Assistant Commissioner accepted that advice.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US National Archives Has Blocked Search Containing 'WikiLeaks'

US National Archives Has Blocked Search Containing 'WikiLeaks'

The movement of WikiLeaks faced another bar, as the searches for “WikiLeaks” in the public search engine for the US National Archives have been blocked. Any search containing the word “WikiLeaks (like “Congress” and “WikiLeaks”; "Obama" and "WikiLeaks") turns up an error message saying "The page you have requested has been blocked, because the URL is banned" as shown the picture below.

The whistle blowing website of WikiLeaks already lashed out at the move, saying the Archives has  literally turned into “Orwell’s Ministry of Truth.” In a tweet the official twitter account of WikiLeaks said “The US state is literally eating its own brain by censoring its own collective memories about WikiLeaks.” And, in another tweet WikiLeaks said, “The US National Archives censoring searches for its records containing the word ‘WikiLeaks’ is absolutely absurd.” 
The block is likely to be in line with the “Protecting Cyberspace as a National Asset Act,” a form of internet censorship the US adopted back in 2010. It did not become law, but it prompted various US government agencies such as the White House Office of Management and Budget and the US Air Force to advise their employees not to read or access classified documents being made available by sites like WikiLeaks. The Library of Congress went further by blocking access to WikiLeaks content from its server in 2010. According to the official blog post of  Library of Congress “The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information.  Unauthorized disclosures of classified documents do not alter the documents’ classified status or automatically result in declassification of the documents.” The White House’s Office of Management and Budget today provided the guidance that “federal agencies collectively, and each federal employee and contractor individually, are obligated to protect classified information pursuant to all applicable laws, as well as to protect the integrity of government information technology systems.” -said Matt Raymond in the blog post of LOC. 
Though it is unknown when the Archives began blocking searches, but according to diplomatic cables released over the past months the US Justice Department’s investigation targeting of both Assange and WikiLeaks is real. So may be this block has connection or may be a return from the U.S. Govt of the last release of WikiLeaks that is  'Detainee Policies'  in what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. At the moment WikiLeaks founder Julian Assange is holed up in the Ecuadorian embassy in London as the UK has forcefully asserted that it will deny him safe passage to Ecuador. Ecuador granted Assange political asylum in August over fears that if extradited to Sweden, Assange could be transferred to the US and once there, face execution.



-Source (RT)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Two Romanian Hackers Pleaded Guilty on Credit Card Hack & Faced 7 Years Imprisonment

Two Romanian Hackers Pleaded Guilty on Credit Card Hack & Faced 7 Years Imprisonment  

According to the U.S. Department of Justice two Romanian hacker- Iulian Dolan & Cezar Butu have pleaded guilty to participating in a US$10 million scheme to hack into the computers of hundreds of Subway restaurants in the U.S. and steal payment card data. Iulian Dolan, 28, of Craiova, Romania, pleaded guilty Monday to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and Cezar Butu, 27, of Ploiesti, Romania, pleaded guilty to one count of conspiracy to commit access device fraud, the DOJ confirmed. Dolan and Butu were two of four Romanians charged in December in U.S. District Court for the District of New Hampshire with hacking Subway point-of-sale computers. In his plea agreement, Dolan has agreed to be sentenced to seven years, and Butu has agreed to be sentenced to 21 months in prison. The two men, in their guilty pleas, acknowledged participating in a Romanian-based conspiracy, lasting from 2009 to 2011, to hack into hundreds of U.S. point-of-sale (POS) computers. Co-conspirator Adrian-Tiberiu Oprea is in U.S. custody and awaiting trial in New Hampshire. The group used stolen payment card data to make unauthorized charges or to transfer funds from the cardholders' accounts, the scheme involved more than 146,000 compromised payment cards and more than $10 million in losses.  
During the conspiracy, Dolan remotely scanned the Internet to identify vulnerable POS systems in the U.S. with certain remote desktop software applications (RDAs) installed on them. Using these RDAs, Dolan logged onto the targeted POS systems over the Internet. The systems were often password-protected and Dolan attempted to crack the passwords to gain administrative access. 
He then installed keystroke logging software onto the POS systems and recorded all of the data that was keyed into or swiped through the POS systems, including customers' payment card data. Thus Dolan managed to steal payment card data belonging to approximately 6,000 cardholders. Dolan received $5,000 to $7,500 in cash and personal property from Oprea for his efforts.
In his plea agreement, Butu said he repeatedly asked Oprea to provide him with stolen payment card data and that Oprea provided him with instructions for how to access the website where Oprea had stored a portion of the stolen payment card data. Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. He also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators. Butu acquired stolen payment card data from Oprea belonging to approximately 140 cardholders
While talking about Romanian Hackers then one name definitely comes in mind and that is Razvan Manole Cernaianu aka "TinKode" who get busted earlier in this year, on charges of hacking into Pentagon and NASA servers, stealing confidential data. Also last year another 26 year aged Romanian hacker faced imprisonment for hacking into NASA servers. 


-Source (CSO)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Tribute to The 10 Most Infamous Student Hackers of All Time

A Tribute to The 10 Most Infamous Student Hackers of All Time

Since last two years, we the VOGH team has been covering all the latest cyber security updates. But today lets do some thing different. One of our frequent reader and fan Katina Solomon has requested us to share a fantastic article. Everyday VOGH draws headlines of hackers around the world and their activities. While trying to maintain speed with time, we usually forgot our past. Today we will take you into the past, where we will discuss about those heroes, who are always been ill treated by the society & the system while revamping those heroes into cyber-criminals or infamous hackers. Its our question to our humanity "Did the system has done justice with them??" 
Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters meddling with the phones at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.
  1. Sven Jaschan: In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.
  2. Jonathan James: In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”
  3. Michael Calce: Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.
  4. Kevin Mitnick: Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.
  5. Tim Berners-Lee: “Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.
  6. Neal Patrick and the 414s: In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.
  7. Robert T. Morris: The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.
  8. George Hotz: To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.
  9. Donncha O’Cearbhaill: According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.
  10. Nicholas Allegra: Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.

We want to dedicate the above post to the legendary hacker, who left us -Jonathan James aka “C0mrade”. Also the post is a tribute to all the so called 'infamous hackers'. You are our heroes and inspiration, you will always be there in our soul. Team VOGH salutes you...... 


-Thank you Katina & Online Degrees




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hacker Sentenced to 30 Months in Prison for Selling Access to Botnets & Infecting 72,000 PCs


Hacker Sentenced to 30 Months in Prison for Selling Access to Botnets & Infecting 72,000 PCs


A 30-year old computer hacker received a thirty month in prison sentence for creating a botnet and a charge of violating the Computer Fraud and Abuse Act. According to Depertment of Justice - Joshua Schichtel, of Phoenix, was sentenced today to 30 months in prison for selling command-and-control access to and use of thousands of malware-infected computers, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division and U.S. Attorney for the District of Columbia Ronald C. Machen Jr.
Schichtel was sentenced by Chief U.S. District Judge Royce C. Lamberth in the District of Columbia.  In addition to his prison term, Schichtel was ordered to serve three years of supervised release. 
Schichtel entered a guilty plea on Aug. 17, 2011, to one count of attempting to cause damage to multiple computers without authorization by the transmission of programs, codes or commands, a violation of the Computer Fraud and Abuse Act.
According to court documents, Schichtel sold access to “botnets,” which are networks of computers that have been infected with a malicious computer program that allows unauthorized users to control infected computers.  Individuals who wanted to infect computers with various different types of malicious software (malware) would contact Schichtel and pay him to install, or have installed, malware on the computers that comprised those botnets.  Specifically, Schichtel pleaded guilty to causing software to be installed on approximately 72,000 computers on behalf of a customer who paid him $1,500 for use of the botnet.

This case was investigated by the Washington Field Office of the FBI.  The case is being prosecuted by Corbin Weiss, Senior Counsel in the Criminal Division’s Computer Crime and Intellectual Property Section and Special Assistant U.S. Attorney for the District of Columbia.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

Just few days ago hacktivist group Anonymous strikes on the cyber fence of UK Government, and sent Ministry of Justice and the Britis Home Office offline for certain period of time. The motive of the cyber attack was directly linked with Wikileaks founder Julian Assange extradition. Not only Anonymous, but also hackers from different part of globe joined 'Operation Free Assange' dubbed '#OpFreeAssange'. As a result  A hacker codenamed '0x00x00' has posted online what appears to be login information for police officers in the Hertfordshire and Nottinghamshire constabularies. The usernames, passwords and PINs were posted to Pastebin on Thursday, along with the banner 'OpFreeAssange' and a quote from Wikileaks founder. The hacker said in the Pastebin document: "This is nothing big not some l33t h4x shit ... but this tells how insecure the Web is." A spokesperson for Nottinghamshire Constabulary said in a statement that, following initial inquiries, the force was "confident at this stage that no restricted or confidential information was accessed or databases compromised". "We continue to investigate and have taken steps to further strengthen security around our website as a precaution," the statement continued. In a statement, Hertfordshire Constabulary said it was investigating the breach, and confirmed that the information had been "stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website". 
This is not the very first time, earlier hackers have targeted website of Police Dept many times. A hacker group named Redhack hit Turkish Police Dept and stolen 850+ police officers details. Also hacker from Anonymous has exposed 600 MB of Personal Data of Boston Police Patrolmens Association (BPPA). Also for #OpPiggyBank Ontario Association of Chiefs of Police & Salt Lake City Police Department Hacked by Anonymous. In 2011Austrian PoliceChicago Police Department also get hacked By Anonymous where more 25K+ Officers Personal Data get leaked.  





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Russian Hacker 'Dmitry Zubakha' Arrested For DDoS Attacks on Amazon, eBay & Priceline

Russian Hacker 'Dmitry Zubakha' Arrested For DDoS Attacks on Amazon, eBay & Priceline

A twenty five years old hacker from Russia get arrested for allegedly perforimg two massive DDoS (Denial-of-Service) attacks on one of the most popular online shopping site Amazon.com and eBay in 2008. Dmitry Olegovich Zubakha also known as "Cyber bandit" in most of the hacker's underground community was indicted in 2011, but he was just arrested in Cyprus on Wednesday. The arrest of Zubakha took place under an international warrant and  currently he is in custody pending extradition to the United States. According to the indictment unsealed on Thursday said- Zubakha, with the help of another Russian hacker planned and executed DDoS attacks against Amazon.com, eBay, and Priceline in the middle of 2008. Zubakha and his co-conspirator launched the attack with the help of a DDoS botnet to generate a large number of traffic which interrupts the normal service of those online shopping sites. According to a press release by the U.S. Department of Justice (DOJ), the attacks made it "difficult for Amazon customers to complete their business on line."
He has been charged by law enforcement for stealing more than 28,000 credit cards in 2009 for that reason, Zubakha and his partner are also charged with aggravated identity theft for illegally using the credit card of at least one person. At present the charges in the indictment conspiracy, intentionally causing damage toa protected computer resulting in a loss of more than $5000, possession of more than 15 unauthorized access devices (credit card numbers), and aggravated identity theft are just allegations. Zubakha faces up to five years in prison for conspiracy, up to teh years in prison and a $250,000 fine for intentionally causing damage to a protected computer, up to ten years in prison and a $250,000 fine for possessing unauthorized access devices, and an additional two years in prison for aggravated identity theft. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DHS Outlines $202 Million To Continuously Monitor Their Computers & Networks For Security Threats

DHS Outlines $202 Million To Continuously Monitor Their Computers & Networks For Security Threats

People like you, me or us those who are directly involved or associated in this security domain knows very well that cyber crime is in a saturated situation. Since last 3-4 years hackers have broken almost 99%, It's already became an International issue. Every day the said security system is getting compromised. To fight against this burning issue the Department of Homeland Security has outlined another program costs more than $202 million to arm federal agencies with new tools to continuously monitor their computer networks for security threats. Contracts for monitoring services will be awarded as early as next year. The tools will enable agencies to monitor their systems every 24 to 72 hours, and to diagnose and prioritize the biggest security weaknesses. Such programs are already in operation at two agencies, the State and Justice departments.
When it comes to continuous monitoring capabilities, “we are a little bit uneven across [the] dot-gov” domain, said John Streufert, director of DHS’ National Cybersecurity Division.
The tools will help agencies be aware of all hardware and software that has access to their networks and ensure they meet security standards. They also will continuously scan their networks for vulnerabilities so they can be quickly addressed when they appear. The tools will include dashboards that present to IT officials snapshots of their networks’ security status to enable quick response in the event a vulnerability. Agencies will have the option of providing their own monitoring using DHS-provided tools; purchasing a monitoring service from another agency or contractor; or obtaining a monitoring service for cloud-based systems from their cloud service providers.








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

KickAss Torrents Facing a Total Blackout in Italy

KickAss Torrents Facing a Total Blackout in Italy

After Pirate bay now another widely preferred BitTorrent website  on the Internet - KickAss Torrents , is facing a total blackout in Italy. Following an investigation by the country’s cybercrime police, an ISP blocking order has now been granted against a site which authorities say is run by criminals generating millions of dollars. FIMI boss Enzo Mazza confirmed to TorrentFreak that both the old and new domains and IP-addresses will be blocked, and added the following message - “The investigation into the criminal organization behind the site is still making progress and the public prosecutor is in touch with the authorities in the countries involved in the case. The case is followed by the Fiscal police who are usually investigating Italian mafia bosses. This means they are well equipped to take the members of the KAT gang to justice.”
In an exclusive report Torrentfreak said - KickAss Torrents has been founded just three years ago in 2009, KickAssTorrents has shown that it’s serious about becoming a leading torrent site player. Of course, that has its drawbacks too. The site’s increasing profile has caused it to appear in numerous MPAA, RIAA and government reports, in the US and elsewhere. News today reveals that the authorities in Italy have been watching the site for some time.
According to a report coming out of the police department with responsibilities for tackling cybercrime, KickAssTorrents will soon be subjected to a nationwide ISP blockade. Translated as “Financial Guard”, the Guardia di Finanza (GdF) is a department under Italy’s Minister of Economy and Finance. Part of the Italian Armed Forces, GdF has in recent years been involved in many file-sharing investigations, most recently against KickAssTorrents.
Operation ‘Last Paradise’ has just concluded with the public prosecutor of the Sardinian capital Cagliari granting an “order of inhibition” which requires the country’s ISPs to cease providing access to the site. Similar orders were previously granted against The Pirate Bay and the now-defunct BTjunkie. “This is another memorable dark day for digital piracy in Italy. After starting with The Pirate Bay in 2008 and the final closing of the doors at BTjunkie in February 2012, the Guardia di Finanza has targeted another super-pirate platform, virtually located in the Philippines and servers scattered around the world,” GdF said in a statement.
“This colossal site of 10 million active torrents receives over 3 million visits daily from all over the world and Italy was the third most popular country of origin for users behind only India and the USA.” GdF adds that by their estimates, KickAssTorrents generates $8.5 million per year from advertising and other revenue.
“This international platform has long been targeted by U.S. authorities as one of the worst sites for the illegal distribution of music,” said Enzo Mazza, chief of FIMI, Italy’s answer to the RIAA. “The intervention of the Italian authorities was very important, especially for the protection of legal music in Italy, which now represents 30% of the market. Platforms such as The Pirate Bay, BTjunkie and KickAssTorrents are run by criminal organizations that make millions from advertising. Responding to the news, Italian lawyer Giovanni Battista Gallus told TorrentFreak that unlike The Pirate Bay blockade, there is no “proper” court order for the current blockade. This also happened with the BTjunkie block earlier, which was handled by the same prosecutor. “In this case the order has been issued only by the public prosecutor, without any judicial intervention,” he said. “I have serious doubts whether this is appropriate under Italian criminal procedure law, and I’m very curious to see the outcome of an appeal against this order.”
The extent of the forthcoming blockade isn’t clear from the information currently being released. However, the GdF statement specifically mentions kickasstorrents.com, a domain the site left behind when it switched to Kat.ph in April 2011.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Russian Hacker Petr Murmylyuk Charged For Hacking Millions of Dollar & Stealing Identity

Russian Hacker Petr Murmylyuk Charged For Hacking Millions of Dollar & Stealing Identity 
The U.S. Justice Department charged a Russian, currently living at New-York for his alleged role in a ring that stolen roughly $1 million by hacking into retail brokerage accounts and executing sham trades. Petr Murmylyuk aka “Dmitry Tokar,” 31, of Brooklyn, N.Y., is charged with one count of conspiracy to commit wire fraud, as well as unauthorized access to computers, and securities fraud. The U.S. Securities and Exchange Commission is also filing a parallel civil action. Beginning in late 2010, Murmylyuk worked with others to steal from online trading accounts at Scottrade, E*Trade, Fidelity, Schwab and other brokerage firms. Members of the ring first gained unauthorized access to the online accounts and changed the phone numbers and email addresses on file to prevent notice of unauthorized trading from going to the victims.
Once the hackers controlled the accounts, they used stolen identities to open additional accounts at other brokerage houses. They then caused the victims’ accounts to make unprofitable and illogical securities trades with the new accounts that benefitted the hackers. One version of the fraud involved causing the victims’ accounts to sell options contracts to the accounts, then to purchase the same contracts back minutes later for up to nine times the price.
In another version of the fraud, they used the accounts to offer short sales of securities at prices well over market price and to force the victim accounts to make irrational purchases. Murmylyuk and a conspirator recruited foreign nationals visiting, studying, and living in the United States – including Russian nationals and Houston residents Anton Mezentsev, Galina Korelina, Mikhail Shatov and others – to open bank accounts into which illegal proceeds could be deposited. Murmylyuk and the conspirator then caused the proceeds of the sham trades to be transferred from the brokerage accounts into the bank accounts, where the stolen money could be withdrawn.
Fidelity, Scottrade, E*Trade, and Schwab have reported combined losses to date of approximately $1 million as a result of the fraudulent schemes. Murmylyuk is also accused of placing a telephone call to Trade Station Securities in which he claimed to be “Dmitry Tokar,” through whose brokerage account the ring placed approximately $200,000 in fraudulent securities trades. Murmylyuk was arrested in Brooklyn on November 3, 2011, in possession of a laptop that evidenced the fraud.


-Source (On Wallstreet)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Sent 20,000 Hacked Notification Message To Webmasters

Google Sent 20,000 Hacked Notification Message To Webmasters 

Matt Cutts from Google has just announced that they have sent out 20,000 messages to owners of websites which may have been hacked. As part of Google’s search quality efforts, strong communication with the webmaster community continues via numerous on-line channels. 
Google advises webmasters and website owners that Google Webmaster Tools remains the single most reliable channel of communication with the search engine. The recent set of notifications was targeting websites which may have been hacked and demonstrating strange redirects.  Privacy advocates are pressing for an investigation into Google after a report by the Federal Communications Commission (FCC) failed to find evidence the search engine giant broke the law in collecting data through its Street View service. The Electronic Privacy Information Center (EPIC) penned a letter to U.S. Attorney General Eric Holder requesting the U.S. Department of Justice launch an investigation into Google. EPIC filed the original complaint with the FCC regarding Google's controversial Street View data-collection practices.
“Over a three-year period, Google, Inc., deployed hundreds of cars on roadways across the United States, outfitted with digital cameras and WiFi receivers, to capture both images available from public roadways and the private communications of Internet users,” EPIC Executive Director Marc Rotenberg wrote in the letter. Google’s “Street View” program has given rise to numerous investigations and lawsuits, but none have adequately determined whether Google’s conduct violated the federal Wiretap Act.”
The letter follows a decision by the FCC to fine Google $25,000 for obstructing its investigation into the allegations surrounding Street View. However, “by the agency’s own admission, the investigation conducted was inadequate and did not address the applicability of federal wiretap law to Google's interception of emails, usernames, passwords, browsing histories, and other personal information," Rotenberg contended.
Rep. Edward Markey, a member of the House Energy and Commerce Committee, recently called the $25,000 fine "a mere slap on the wrist for Google."





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice Website

Hacker from infamous Anonymous claimed to take down the official website of U.S. Department of Justice (DOJ) & Central Intelligence Agency (CIA). Here also hackers followed their older tradition by engaging massive denial of service (DoS) attack to send the target offline. Due to large number of traffic CIA website was inaccessible for 45 mins. A Brazilian hacker code named "Havittaja" took responsibility of this attack by saying saying it was done for the "lulz", which refers to the popular online abbreviation "for laughs".

We have seen similar attack on CIA in last February, there also Anonymous took responsibility of that cyber attack and also claimed that this is yet another biggest denial of service attack of this year. We would also like to refresh your memory while saying not only Anonymous but also a hacker group named "CyberZeist" has revealed some classified information regarding the official website of CIA. He also exposed server details, DNS information, administrator login panel and so on. Even the hacker group leaked certain information about five undercover CIA agent's including real name, age, full postal address, banking details, credit card information, email-id & passwords. If you dig the history we will find that in 2011 Lulzsec hit CIA & SOCA with massive DDoS attack which immediately sent the website offline for a certain period of time.
If you talk about Department of Justice then we need to dig the 1st page of Operation Megaupload where hacktivist shutdown the official website of DOJ & FBI

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...