Sunday, October 13, 2024
Homecyber securityNotorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For...

Notorious FIN7 Hackers Group SysAdmin Sentenced to 10 Years in Prison For Hacking $3 Billion Worth Debit & Credit Cards

Published on

Malware protection

A citizen of Ukraine, Fedir Hladyr was sentenced to 10 Years in Prison for a set of cyberattacks that generated more than $3 billion worth of damages around the globe.

The experts affirmed that the hacker group hacked nearly 100 American companies and stolen millions of credit and debit card numbers.

According to the experts, the systems manager and one of the leaders of the Carbanak hacking group, which is also known as FIN7, has been convicted to 10 years in prison in the United States.

- Advertisement - SIEM as a Service

As per the report, that has been pronounced by the cybersecurity expert, Fedir Hladyr, 35, who was working as a manager and systems administrator for a hacking group known as FIN7.

However, Hladyr was initially arrested in Germany and later abandoned in Seattle, United States. After that, he has pleaded guilty in 2019 for planning to perform hacking and wire fraud.

Fedir Hladyr was the very first member and were part of the FIN7 hacker group, which has attacked several companies in the United States.

“FIN7 member engaged in a highly sophisticated malware campaign to attack hundreds of U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. “

Not only this but after attacking the companies the hackers have stolen millions of bank card numbers, and hacked the company that is situated in the UK, Australia, and France.

Sentenced 10 Years in Prison

The FIN7 threat actor has been sentenced to 10 years in prison, and the news was confirmed by the U.S. Department of Justice.

The U.S justice department reported that in Hladyr sentencing hearing, he told the court that he had “ruined years of his life and put his family through great uncertainty and struggle.”

Fedir Hladyr was arrested in Dresden, Germany, in 2018 and surrendered to the U.S. city of Seattle. The justice of the department, also mentioned that Hladyr has also been commanded to pay $2.5 million in compensation for the crime he has made.

In a report, that has been mentioned by the Justice Department of Washington, Hladyr joined FIN7 through a front company named Combi Security, it’s a fake cybersecurity company.

Moreover, Hladyr was also admitted in his plea agreement that he immediately realized that, far from being a reliable company, Combi was part of a criminal enterprise.

However, Hladyr has served as FIN7’s systems manager and played a central role in aggregating stolen payment card data. After a proper investigation, the experts say that despite the arrests of the manager of FIN7, other hackers of their team were continuing their criminal operations.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...