Showing posts sorted by date for query Romanian. Sort by relevance Show all posts
Showing posts sorted by date for query Romanian. Sort by relevance Show all posts

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York 

Yet again another serious issue of cyber crime get resolved when the FBI tracked and figured out the master mind of infamous 'Gozi banking Trojan' which effected more than millions of system world wide, including a handful at NASA, leading to tens of millions of dollars in lost banking funds and damages to computer systems and networks. Three alleged international cyber criminals from Russia, responsible for creating and distributing 'Gozi' that infected over one million computers and caused tens of millions of dollars in losses charged in Manhattan Federal Court. Mihai Ionut Paunescu aged 28, a Romanian, Deniss Calovskis, 27, a Latvian, and Nikita Vladimirovich Kuzmin, 25, of the Russian Federation, are charged with computer intrusion, conspiracy to commit bank and wire fraud and access device fraud. Federal authorities said the three were arrested last week; Kuzmin is being held in New York, while Paunescu is in custody in Romania and Calovskis in Latvia. 
According to the press release of FBI -Deniss Calovskis, a/k/a “Miami,” a Latvian national who allegedly wrote some of the computer code that made the Gozi virus so effective, was arrested in Latvia in November 2012. Mihai Ionut Paunescu, a/k/a “Virus,” a Romanian national who allegedly ran a “bulletproof hosting” service that enabled cyber criminals to distribute the Gozi virus, the Zeus trojan, and other notorious malware and to conduct other sophisticated cyber crimes, was arrested in Romania in December 2012. 

The cases are being handled by the Complex Frauds Unit of the United States Attorney’s Office. Assistant United States Attorneys Sarah Lai, Nicole Friedlander, and Thomas G.A. Brown, along with Trial Attorney Carol Sipperly of the Computer Crime and Intellectual Property Section of the Department of Justice on the Paunescu case, are in charge of the prosecution. The charges contained in the Indictments are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

DefendantAge and ResidenceChargesMaximum Penalty
Nikita Kuzmin25; Moscow, RussiaConspiracy to commit bank fraud; bank fraud; conspiracy to commit access device fraud; access device fraud; conspiracy to commit computer intrusion; computer intrusion95 years in prison
Deniss Calovskis27; Riga, LatviaConspiracy to commit bank fraud; conspiracy to commit access device fraud; conspiracy to commit computer intrusion; conspiracy to commit wire fraud; conspiracy to commit aggravated identity theft67 years in prison
Mihai Ionut Paunescu28; Bucharest, RomaniaConspiracy to commit computer intrusion; conspiracy to commit bank fraud; conspiracy to commit wire fraud60 years in prison


Brief About Gozi:-
The Gozi virus is malicious computer code, or “malware,” that steals personal bank account information, including usernames and passwords, from the users of affected computers. It was named by private sector information security experts in the U.S. who, in 2007, discovered that previously unrecognized malware was stealing personal bank account information from computers across Europe on a vast scale, while remaining virtually undetectable in the computers it infected. To date, the Gozi virus has infected over one million victim computers worldwide, among them at least 40,000 computers in the U.S., including computers belonging to the National Aeronautics and Space Administration (NASA), as well as computers in Germany, Great Britain, Poland, France, Finland, Italy, Turkey, and elsewhere, and it has caused tens of millions of dollars in losses to the individuals, businesses, and government entities whose computers were infected.

The Gozi virus was distributed to victims’ computers in several different ways. In one method, the virus was disguised as an apparently benign .pdf document which, when opened, secretly installed the Gozi virus on the victim’s computer. Once installed, the Gozi virus—which was intentionally designed to be undetectable by anti-virus software—collected data from the infected computer in order to capture personal bank account information including usernames and passwords. That data was then transmitted to various computer servers controlled by the cyber criminals who used the Gozi virus. These cyber criminals then used the personal bank account information to transfer funds out of the victims’ bank accounts and ultimately into their own personal possession.


For Detailed Information Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Two Romanian Hackers Pleaded Guilty on Credit Card Hack & Faced 7 Years Imprisonment

Two Romanian Hackers Pleaded Guilty on Credit Card Hack & Faced 7 Years Imprisonment  

According to the U.S. Department of Justice two Romanian hacker- Iulian Dolan & Cezar Butu have pleaded guilty to participating in a US$10 million scheme to hack into the computers of hundreds of Subway restaurants in the U.S. and steal payment card data. Iulian Dolan, 28, of Craiova, Romania, pleaded guilty Monday to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and Cezar Butu, 27, of Ploiesti, Romania, pleaded guilty to one count of conspiracy to commit access device fraud, the DOJ confirmed. Dolan and Butu were two of four Romanians charged in December in U.S. District Court for the District of New Hampshire with hacking Subway point-of-sale computers. In his plea agreement, Dolan has agreed to be sentenced to seven years, and Butu has agreed to be sentenced to 21 months in prison. The two men, in their guilty pleas, acknowledged participating in a Romanian-based conspiracy, lasting from 2009 to 2011, to hack into hundreds of U.S. point-of-sale (POS) computers. Co-conspirator Adrian-Tiberiu Oprea is in U.S. custody and awaiting trial in New Hampshire. The group used stolen payment card data to make unauthorized charges or to transfer funds from the cardholders' accounts, the scheme involved more than 146,000 compromised payment cards and more than $10 million in losses.  
During the conspiracy, Dolan remotely scanned the Internet to identify vulnerable POS systems in the U.S. with certain remote desktop software applications (RDAs) installed on them. Using these RDAs, Dolan logged onto the targeted POS systems over the Internet. The systems were often password-protected and Dolan attempted to crack the passwords to gain administrative access. 
He then installed keystroke logging software onto the POS systems and recorded all of the data that was keyed into or swiped through the POS systems, including customers' payment card data. Thus Dolan managed to steal payment card data belonging to approximately 6,000 cardholders. Dolan received $5,000 to $7,500 in cash and personal property from Oprea for his efforts.
In his plea agreement, Butu said he repeatedly asked Oprea to provide him with stolen payment card data and that Oprea provided him with instructions for how to access the website where Oprea had stored a portion of the stolen payment card data. Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. He also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators. Butu acquired stolen payment card data from Oprea belonging to approximately 140 cardholders
While talking about Romanian Hackers then one name definitely comes in mind and that is Razvan Manole Cernaianu aka "TinKode" who get busted earlier in this year, on charges of hacking into Pentagon and NASA servers, stealing confidential data. Also last year another 26 year aged Romanian hacker faced imprisonment for hacking into NASA servers. 


-Source (CSO)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Another Romanian Hacker Get Busted on Pentagon & NASA Server Hacking Charges

Another Romanian Hacker Get Busted on Pentagon & NASA Server Hacking Charges
Yet another Romanian hacker get busted on charges of hacking into Pentagon and NASA servers, stealing confidential data. The hacker have posted all the stolen information on his personal blog. Razvan Manole Cernaianu, an information technology student who allegedly used the online alias "TinKode," offered a software program for sale on his blog and also showed a video that demonstrated how he compromised the servers, officials said. Romanian officials said they were working with the FBI and NASA representatives on the case. An FBI spokesman in Washington, D.C., did not immediately have comment this afternoon. The U.S. Embassy in Bucharest said Cernaianu "used sophisticated hacking tools to gain unauthorized access to government and commercial systems." The case demonstrates that "countries and agencies around the globe" could cooperate "to counter these types of threats," it said.
This is not the first time earlier another 26 year aged Romanian Guy face imprisonment for hacking into NASA servers. Also If you dig the history you will find that previously NASA was hit many times by the hackers from different part of the world. Such as Spamers targeted NASA, TeaMp0isoN hacked NASA official forum, Chinese Hackers hit NASA satellites, Indian hacker minhal stole secrete  information from NASA and so on.


-Source (Diicot)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Romanian Hacker Get Busted For Hacking Into NASA Servers


A Romanian hacker have to face imprisonment for hacking into NASA servers. 26-year-old Romanian national, currently in detention, is charged with breaching security measures to access several of NASA’s servers in December 2010. Prosecutors said Wednesday that he interfered with server data, causing NASA losses of about $500,000 (€371,000). Yet there was no comment from the U.S. Embassy. Court spokesman Lucian Marian in the northwest city of Cluj says Robert Butyka would be arrested for 29 days as he awaits trial. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

GIF Vulnerability Patch For Photoshop Mac Users


The folks at Adobe have been keeping themselves busy this week patching several security holes in their software, including one affecting Photoshop Mac users.
According to a recent technical note on Adobe's site, those using the company’s professional photo editing software on a Mac are advised to patch immediately using Photoshop Standard Multiplugin CS5/CS5.1.
Adobe has recently learned that opening a GIF image of unknown origin may have a negative outcome. Here’s the situation in the Flash maker’s own words:
“The standard multiplugin update addresses a security vulnerability in the GIF file format, where opening a malicious GIF file would cause the application to crash.”

“This update is recommended for anyone who opens GIF files in Photoshop,”
Adobe says.

Surely those editing multiple pictures at the same time would hate to see Photoshop crash before them simply because they opened a GIF image.

It works on systems running Mac OS X 10.5.7 (Leopard) and Mac OS X 10.6 (Snow Leopard) and it applies to one of the following language versions of Photoshop CS5 or Photoshop CS5.1: English, French, Spanish, Portuguese, German, Italian, Dutch, Swedish, Danish, Finnish, Norwegian, Chinese Simplified, Chinese Traditional, Korean, Japanese, Czech, Polish, Russian, Turkish, Hungarian, Ukrainian, or Romanian.

After downloading the ".zip" file containing the Photoshop CS5/CS5.1 Standard Multiplugin Update, Mac users must decompress the contained file and drag it to a specific location where Photoshop is installed.

The full set of instructions, as posted on Adobe’s web site, follows below:
1. Download plugin update
2. Unzip plugin update
3. Open Unzipped plugin folder
4. Drag and drop (or copy and paste) Standard Multiplugin.plugin to Applications\Adobe Photoshop CS5 (or CS5.1)\Plug-ins\Filters
5. Replace the existing file(s) when prompted
6. Relaunch PS

To download the 4MB patch click Here

-News Source (Adobe & Softpedia)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bitdefender total Security 2012


Bitdefender has updated its suites for the coming year, and it says it has done it in part by adopting a bit of Romanian lore. Although, to be honest, it may also sound familiar to fans of George R.R. Martin's Game of Thrones series. Available exclusively today from CNET Download.com, Bitdefender Total Security 2012 (download), Bitdefender Internet Security 2012 (download), and Bitdefender Antivirus Plus 2012 (download) were improved in part by taking on the "philosophy based on mythical wolf-dragon from Romania," said Matt Hicks, the company's global public relations manager. The wolf-dragon, he said, is supposed to represent security and alertness. 
Whatever the impetus behind the redesign of the suite, there's no doubt that they include a number of notable improvements. A revamped interface has given the suites a cleaner design that feels lighter and easier to use, while retaining its modularity. The virus-detection engine has been improved to look at processes while they are running, while Bitdefender's own processes were moved to the kernel to make it more difficult to for threats to circumvent the suite. In turn, this has reduced the suite's impact on system resources, according to Catalin Cosoi, Bitdefender's head of Online Threats Lab.
The browser add-on for Firefox and Internet Explorer has been wisely done away with, replaced by a make-agnostic module that will protect you across all five major browsers by scanning Web traffic before it reaches the browser. A new autopilot feature has been added to create a completely silent security experience. It's similar to Bitdefender's competitors' "silent" or "gaming" mode, although it does a bit more than just silencing security pop-up alerts. It also makes some changes to the program's settings, in how it deals with threats, and it also is on as the default setting for Bitdefender. Meanwhile, a vulnerability scanner will check your computer for outdated programs, drivers, and patches, and recommend solutions.
The Bitdefender Safego tool has been integrated into the suite, too. It performs link scanning for Facebook, with plans to include Twitter support soon. On Facebook, it will scan your news and wall feeds. It's also available for free to all Facebook users, and the company's Android app remains free to use for all, as well.
The rescue mode changes are extremely useful. If threats like rootkits can't be removed easily, the computer is rebooted into rescue mode. Florin Virlan, Software Engineering Director, said that Bitdefender's rescue mode differs from competitors because it creates a "self-contained Linux OS, contained in one encrypted file on your PC," that the rescue mode boots into. It also adds Linux as an option to your boot BIOS. 
The Safebox feature, which automatically backs up your files to a remote server when changes have been detected, will now sync files across multiple computers when they are running Bitdefender. Notably, Safebox is the only new or improved feature that only comes in Bitdefender Total Security 2012. The other improvements have been made across all three suites.
One thing to watch out for is that Bitdefender does not play well with any other security program, even the ones designed to work as complements to security suites like Malwarebytes. Come back to Download.com later today to read full reviews of Bitdefender's 2012 suites. 
For More info Click HERE

-News Source (CNET)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...