Tuesday, May 13, 2025
Homecyber securityNotorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For...

Notorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For Hacking $3 Billion Worth Debit & Credit Cards

Published on

SIEM as a Service

Follow Us on Google News

A citizen of Ukraine, Fedir Hladyr was sentenced to 10 Years in Prison for a set of cyberattacks that generated more than $3 billion worth of damages around the globe.

The experts affirmed that the hacker group hacked nearly 100 American companies and stolen millions of credit and debit card numbers.

According to the experts, the systems manager and one of the leaders of the Carbanak hacking group, which is also known as FIN7, has been convicted to 10 years in prison in the United States.

- Advertisement - Google News

As per the report, that has been pronounced by the cybersecurity expert, Fedir Hladyr, 35, who was working as a manager and systems administrator for a hacking group known as FIN7.

However, Hladyr was initially arrested in Germany and later abandoned in Seattle, United States. After that, he has pleaded guilty in 2019 for planning to perform hacking and wire fraud.

Fedir Hladyr was the very first member and were part of the FIN7 hacker group, which has attacked several companies in the United States.

“FIN7 member engaged in a highly sophisticated malware campaign to attack hundreds of U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. “

Not only this but after attacking the companies the hackers have stolen millions of bank card numbers, and hacked the company that is situated in the UK, Australia, and France.

Sentenced 10 Years in Prison

The FIN7 threat actor has been sentenced to 10 years in prison, and the news was confirmed by the U.S. Department of Justice.

The U.S justice department reported that in Hladyr sentencing hearing, he told the court that he had “ruined years of his life and put his family through great uncertainty and struggle.”

Fedir Hladyr was arrested in Dresden, Germany, in 2018 and surrendered to the U.S. city of Seattle. The justice of the department, also mentioned that Hladyr has also been commanded to pay $2.5 million in compensation for the crime he has made.

In a report, that has been mentioned by the Justice Department of Washington, Hladyr joined FIN7 through a front company named Combi Security, it’s a fake cybersecurity company.

Moreover, Hladyr was also admitted in his plea agreement that he immediately realized that, far from being a reliable company, Combi was part of a criminal enterprise.

However, Hladyr has served as FIN7’s systems manager and played a central role in aggregating stolen payment card data. After a proper investigation, the experts say that despite the arrests of the manager of FIN7, other hackers of their team were continuing their criminal operations.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate...

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

INE Security Alert: Top 5 Takeaways from RSAC 2025

Comprehensive Training Platform Delivers Solutions for AI Security, Cloud Management, and Incident Response Readiness. Fresh...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate...

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...