Tuesday, March 11, 2025
Homecyber securityNotorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For...

Notorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For Hacking $3 Billion Worth Debit & Credit Cards

Published on

SIEM as a Service

Follow Us on Google News

A citizen of Ukraine, Fedir Hladyr was sentenced to 10 Years in Prison for a set of cyberattacks that generated more than $3 billion worth of damages around the globe.

The experts affirmed that the hacker group hacked nearly 100 American companies and stolen millions of credit and debit card numbers.

According to the experts, the systems manager and one of the leaders of the Carbanak hacking group, which is also known as FIN7, has been convicted to 10 years in prison in the United States.

As per the report, that has been pronounced by the cybersecurity expert, Fedir Hladyr, 35, who was working as a manager and systems administrator for a hacking group known as FIN7.

However, Hladyr was initially arrested in Germany and later abandoned in Seattle, United States. After that, he has pleaded guilty in 2019 for planning to perform hacking and wire fraud.

Fedir Hladyr was the very first member and were part of the FIN7 hacker group, which has attacked several companies in the United States.

“FIN7 member engaged in a highly sophisticated malware campaign to attack hundreds of U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. “

Not only this but after attacking the companies the hackers have stolen millions of bank card numbers, and hacked the company that is situated in the UK, Australia, and France.

Sentenced 10 Years in Prison

The FIN7 threat actor has been sentenced to 10 years in prison, and the news was confirmed by the U.S. Department of Justice.

The U.S justice department reported that in Hladyr sentencing hearing, he told the court that he had “ruined years of his life and put his family through great uncertainty and struggle.”

Fedir Hladyr was arrested in Dresden, Germany, in 2018 and surrendered to the U.S. city of Seattle. The justice of the department, also mentioned that Hladyr has also been commanded to pay $2.5 million in compensation for the crime he has made.

In a report, that has been mentioned by the Justice Department of Washington, Hladyr joined FIN7 through a front company named Combi Security, it’s a fake cybersecurity company.

Moreover, Hladyr was also admitted in his plea agreement that he immediately realized that, far from being a reliable company, Combi was part of a criminal enterprise.

However, Hladyr has served as FIN7’s systems manager and played a central role in aggregating stolen payment card data. After a proper investigation, the experts say that despite the arrests of the manager of FIN7, other hackers of their team were continuing their criminal operations.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

“Eleven11bot” Botnet Compromises 30,000 Webcams in Massive Attack

Cybersecurity experts have uncovered a massive Distributed Denial-of-Service (DDoS) botnet known as "Eleven11bot."This new...

SideWinder APT Deploys New Tools in Attacks on Military & Government Entities

The SideWinder Advanced Persistent Threat (APT) group has been observed intensifying its activities, particularly...

Apache Pinot Vulnerability Allows Attackers to Bypass Authentication

A significant security vulnerability affecting Apache Pinot, an open-source distributed data store designed for...

Lazarus Hackers Exploit 6 NPM Packages to Steal Login Credentials

North Korea's Lazarus Group has launched a new wave of attacks targeting the npm...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SideWinder APT Deploys New Tools in Attacks on Military & Government Entities

The SideWinder Advanced Persistent Threat (APT) group has been observed intensifying its activities, particularly...

Lazarus Hackers Exploit 6 NPM Packages to Steal Login Credentials

North Korea's Lazarus Group has launched a new wave of attacks targeting the npm...

CISA Added 3 Ivanti Endpoint Manager Bugs to Wildly Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV)...