Saturday, January 18, 2025
Homecyber securityNotorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For...

Notorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For Hacking $3 Billion Worth Debit & Credit Cards

Published on

SIEM as a Service

Follow Us on Google News

A citizen of Ukraine, Fedir Hladyr was sentenced to 10 Years in Prison for a set of cyberattacks that generated more than $3 billion worth of damages around the globe.

The experts affirmed that the hacker group hacked nearly 100 American companies and stolen millions of credit and debit card numbers.

According to the experts, the systems manager and one of the leaders of the Carbanak hacking group, which is also known as FIN7, has been convicted to 10 years in prison in the United States.

As per the report, that has been pronounced by the cybersecurity expert, Fedir Hladyr, 35, who was working as a manager and systems administrator for a hacking group known as FIN7.

However, Hladyr was initially arrested in Germany and later abandoned in Seattle, United States. After that, he has pleaded guilty in 2019 for planning to perform hacking and wire fraud.

Fedir Hladyr was the very first member and were part of the FIN7 hacker group, which has attacked several companies in the United States.

“FIN7 member engaged in a highly sophisticated malware campaign to attack hundreds of U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. “

Not only this but after attacking the companies the hackers have stolen millions of bank card numbers, and hacked the company that is situated in the UK, Australia, and France.

Sentenced 10 Years in Prison

The FIN7 threat actor has been sentenced to 10 years in prison, and the news was confirmed by the U.S. Department of Justice.

The U.S justice department reported that in Hladyr sentencing hearing, he told the court that he had “ruined years of his life and put his family through great uncertainty and struggle.”

Fedir Hladyr was arrested in Dresden, Germany, in 2018 and surrendered to the U.S. city of Seattle. The justice of the department, also mentioned that Hladyr has also been commanded to pay $2.5 million in compensation for the crime he has made.

In a report, that has been mentioned by the Justice Department of Washington, Hladyr joined FIN7 through a front company named Combi Security, it’s a fake cybersecurity company.

Moreover, Hladyr was also admitted in his plea agreement that he immediately realized that, far from being a reliable company, Combi was part of a criminal enterprise.

However, Hladyr has served as FIN7’s systems manager and played a central role in aggregating stolen payment card data. After a proper investigation, the experts say that despite the arrests of the manager of FIN7, other hackers of their team were continuing their criminal operations.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google's "Sign in with Google" authentication system has left millions...

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the...

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...