US Cop Indicted Over Buying Stolen Data
Read also: Japan's police arrest 18 members of a cybercrime group, FBI’s most wanted cybercriminal arrested in Italy, and more.
US cop indicted for buying stolen data on Genesis Market Dark Web market
Terrance Michael Ciszek, a 34-year-old Buffalo police detective, has been charged with possession of unauthorized access devices with intent to defraud, as well as making false statements to a federal agency.
The charges come as part of an ongoing investigation led by the FBI into Genesis Market, an illicit online marketplace that specialized in selling stolen data collected from malware-infected computers.
Ciszek is accused of purchasing 11 packages of stolen credentials through Genesis Market that included a total of 194 stolen account credentials. Investigators also discovered that Ciszek had bitcoin wallet addresses connected to UniCC, a well-known Dark Web carding website. If convicted, he faces a potential penalty of up to 10 years in prison.
In related news, another Buffalo resident, Wul Isaac Chol, was sentenced to 20 months in prison for purchasing stolen data on Genesis Market. Between June 2019 and January 2021, Chol deposited $105.08 worth of bitcoin into a Genesis Market account he created. He used the funds to purchase 21 packages containing 778 unauthorized access devices. Additionally, Chol unlawfully obtained $25,164 from the New York State Department of Labor.
Japan's police arrest 18 members of a cybercrime group after tracing Monero transactions
Japan's National Police Agency has arrested 18 members of a cybercrime group after authorities traced their Monero transactions. The group, which has been active since mid-2021, was involved in stealing funds from victims through fake online classified ads and laundering the proceeds using Monero.
The group is believed to have laundered over 100 million yen (~$660,000). The alleged ringleader, Yuta Kobayashi, 26, was arrested on suspicion of computer fraud. Kobayashi allegedly used credit cards under stolen identities to make fraudulent purchases and generate illegal profits.
According to the police, the cybercriminal group carried out around 900 fraudulent transactions using stolen credit card information from June 2021 to January 2022. The stolen data was likely obtained through phishing techniques, such as fake websites and emails designed to trick victims into revealing their sensitive information.
The group reportedly recruited members through social media, advertising “illegal part-time jobs” to attract accomplices. Communication within the group took place over confidential messaging apps. Investigators believe the dismantled cybercrime ring to be part of a larger “anonymous, mobile crime group,” also known as a “tokuryu,” which operates by gathering and dispersing members via social media.
Cybersecurity Compliance
Prevent data breaches and meet regulatory requirements
FBI’s most wanted cybercriminal caught in Italy after three years on the run
Milan State Police has apprehended a 43-year-old Italian-Australian man wanted globally for his involvement in a massive computer fraud and money laundering scheme. The suspect, on the run for over three years, is accused of being a key figure in a $31 million scam that targeted vulnerable individuals, particularly the elderly.
The arrest, carried out by Italian authorities, was made under a warrant issued by the District Court of North Carolina, the US. The man, whose identity hasn’t been disclosed, faces charges of criminal conspiracy related to computer fraud, tampering with protected computer systems, and laundering illicit funds.
The scam scheme involved sophisticated social engineering tactics. Victims were targeted with a message on their computer screens warning them that their devices had been “compromised” due to an error. The message included an “error code” and an urgent instruction to contact a specific call center for technical assistance. Upon calling the number, victims were persuaded to make payments for technical support ostensibly to prevent the data loss and computer damage. However, the cybercriminals behind the scheme just pocketed the money without providing any real assistance.
The suspect was apprehended at Malpensa Airport while carrying several thousand euros in cash, multiple credit cards, several computer devices, and two high-value watches. Currently held by Italian authorities, the man awaits extradition to the United States, where he will face trial on charges related to the fraudulent scheme.
Dutch police arrest four people for selling stolen personal data on Telegram
Dutch police have arrested four individuals accused of selling stolen personal data via Telegram groups. The arrests were made after a months-long investigation aimed at dismantling networks involved in trading sensitive personal information, often used for further criminal activities.
The suspects, a 26-year-old man and a 20-year-old woman from Leeuwarden, a 28-year-old man from Maarssen, and a 31-year-old man without a fixed address, were apprehended in coordinated raids. Authorities also seized multiple data storage devices and three firearms during the operation.
The suspects are accused of trafficking personal information that includes names, dates of birth, phone numbers, bank details, and home addresses.
Investigators believe the data was obtained through cyber-attacks, data breaches, or theft from various companies and then sold in private Telegram groups known for facilitating illegal trades.
The FBI arrests a SIM swapper over the SEC breach and alleged bitcoin manipulation
US law enforcement authorities arrested a 25-year-old Alabama man in connection with a hack of the US Securities and Exchange Commission’s (SEC) X account earlier this year.
According to the indictment, the suspect, identified as Joseph Council, used online aliases such as “Ronin,” “Easymunny,” and “AGiantSchnauzer” to orchestrate the attack on January 9, 2024. The SEC's @SECGov X account was briefly taken over, and the hacker posted a misleading message, claiming that the SEC had approved bitcoin exchange-traded funds (ETFs), a move long anticipated by cryptocurrency investors. Shortly after the unauthorized post, the SEC regained control of its account and issued a correction, confirming that the statement was false and the result of a security breach.
Federal authorities allege that Council gained access to the SEC’s account through a “SIM swap” attack, a tactic that involves manipulating mobile carrier systems to transfer control of a victim’s phone number to the hacker's device.
Council created a fake ID card using the personal information obtained via his co-conspirators and executed a SIM swap by presenting the ID at a phone store. With the SIM and a newly purchased iPhone, Council hijacked the Sec’s X account. Council received bitcoin as payment for the SIM swap and later returned the iPhone for cash.
What’s next:
- Join our upcoming webinars
- Follow ImmuniWeb on Twitter, LinkedIn and Telegram
- Explore 20 use cases how ImmuniWeb can help
- Browse open positions to join our great Team
- See the benefits of our partner program
- Request a demo, quote or special price
- Subscribe to our newsletter