Wednesday, December 4, 2024
HomeHacksRussian Hacker Jailed for Running a Darkweb Market Place that Sells Stolen...

Russian Hacker Jailed for Running a Darkweb Market Place that Sells Stolen Credit card Details

Published on

SIEM as a Service

The Russian citizen Kirill Victorovich Firsov has been sentenced to jail by the Southern District Court of California, and Firsov has been sentenced to 2.5 years in prison.

According to the report, Firsov has been running a Dark web market, that provides all kinds of services to different cybercriminals. And not only that even the court affirmed that Firsov has been selling all the personal data regarding the credit cards, phone numbers, and social security numbers.

Apart from all this, the US Department of Justice also claimed that Firsov has been operating this illegal working website since October 2013. After investigating the report pronounced that nearly 3 thousand active stores with around a total of 17 million of turnover.

- Advertisement - SIEM as a Service

Hacker Jailed for Running a Darkweb Market Place

On March 7 in New York Firsov got arrested, and after that, he continues to be held in custody by the security authorities. Here, the US department stated that all the data that has been collected by Kirill Viktorovich Firsov is used for all criminal purposes.

Not only this but the US department of justice also claimed that the website that was being operated by Firsov was named “Deer[.]io, and hosted more than 24,000 online stores on a basis of subscription, which has a different course in its lifetime. 

The platform hosted approximately 3,000 active shops with sales exceeding $17 million. 

Moreover, the law enforcement has detected some stolen accounts that were on sale, the accounts include different names, addresses, telephone numbers, and Social Security numbers. 

To know all the key details of Firsov, the FBI purchased some accounts from the website. And on March 4, 2020, the FBI has acquired 1100 gamer accounts, after that on March 5, 2020, the FBI acquired the personal information of over 3,600 US citizens.

After purchasing different accounts, the FBI came to know that there are many victims that belong from the US and Europe. The supervising US District Judge Cynthia Bashant noted that Firsov has previously spent 15 months in the US prison system, while the severe COVID-19 pandemic mopped the whole world. 

Firsov was charged for “Unauthorized Solicitation of Access Devices,” on January 21, 2021, and it’s a charge for which any criminal can get a maximum punishment of 10 years in prison or a hefty fine of $250,000.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host...

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...

Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT

The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in...

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers

Phishing attacks have surged nearly 40% in the year ending August 2024, with a...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing...