Tuesday, March 4, 2025
HomeCyber Security NewsHacker Receives 18-Month Prison for Running Dark Web Forum

Hacker Receives 18-Month Prison for Running Dark Web Forum

Published on

SIEM as a Service

Follow Us on Google News

In a momentous development in cybersecurity, Thomas Kennedy McCormick, alias “fubar,” a resident of Cambridge, Massachusetts, has been sentenced to 18 months imprisonment for masterminding a racketeering conspiracy within the infamous Darkode hacking forum.

The intricate web of cybercrime unraveled in the courtroom, revealing McCormick’s pivotal role in the development and dissemination of malicious software, resulting in substantial financial losses.

U.S. Attorney Matthew M. Graves and Acting Special Agent in Charge David Geist from the FBI’s Washington Field Office’s Criminal and Cyber Division jointly announced McCormick’s sentencing.

Along with the prison term, U.S. District Judge John D. Bates imposed 36 months of supervised release, emphasizing continued scrutiny over the convicted cyber offender.

Darkode’s Enigmatic Underworld

Court documents illuminated McCormick’s tenure as an administrator within Darkode, a clandestine organization operating within a password-protected cyber forum.

This illicit consortium served as a breeding ground for high-profile international hackers and cybercriminals, facilitating the development, trade, and exchange of hacking tools, knowledge, and nefarious ideas.

McCormick’s ascent from member to administrator marked his involvement in deploying malware worldwide, gaining illicit access and control over numerous devices.

McCormick’s malevolent activities extended beyond administrative duties, as he crafted and sold malicious software designed to pilfer users’ personal information, banking credentials, and credit card details.

The court revealed that his possession included stolen credit card data from nearly 30,000 individuals, along with an assortment of malware copies, reads the Attorney report.

While many envision hackers hiding in shadowy basements, one recent case proves dark web forums can operate surprisingly close to home. A seemingly ordinary citizen was revealed to be the mastermind behind a bustling online marketplace for stolen data, siphoning credit card numbers, passports, and even power of attorney documents.

His 18-month prison sentence serves as a stark reminder that the internet’s anonymity is a double-edged sword, offering both opportunity for illicit activities and a false sense of security. In this age of digital shadows, even seemingly mundane legal documents are not immune to the dark web’s reach, highlighting the need for increased vigilance and robust cybersecurity measures.

McCormick’s guilty plea acknowledged his culpability in inflicting approximately $679,000 in financial losses through these cyber offenses.

Facing charges of racketeering conspiracy, conspiracy to commit wire and bank fraud, and aggravated identity theft, McCormick’s legal entanglement culminated in a guilty plea on March 3, 2020.

The sentencing was meted out as 12 months for racketeering conspiracy and an additional 6 months for aggravated identity theft, which encapsulates the legal ramifications of his cyber machinations.

This sentencing serves as the latest chapter in a sprawling investigation that led to the dismantling of Darkode in July 2015.

Twelve individuals faced charges in a coordinated effort involving law enforcement agencies from 20 nations, revealing the international reach and collaboration required to combat cybercrime.

The FBI spearheaded the investigation, receiving crucial assistance from Europol, the European CyberCrime Center (EC3), the United Kingdom’s National Crime Agency, and the Metropolitan Police Service (Scotland Yard).

Prosecutorial Symphony

The Fraud, Public Corruption, and Civil Rights Section of the U.S. Attorney’s Office for the District of Columbia collaborated with the Computer Crime and Intellectual Property Section, Violent Crime and Racketeering Section, and the Office of International Affairs of the Department of Justice’s Criminal Division.

Former Assistant U.S. Attorneys John P. Dominguez and Corbin A. Weiss, alongside current Assistant U.S. Attorney Peter V. Roman, orchestrated the legal proceedings.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...