Thursday, February 27, 2025
HomeHacksRussian Hacker Jailed for Running a Darkweb Market Place that Sells Stolen...

Russian Hacker Jailed for Running a Darkweb Market Place that Sells Stolen Credit card Details

Published on

SIEM as a Service

Follow Us on Google News

The Russian citizen Kirill Victorovich Firsov has been sentenced to jail by the Southern District Court of California, and Firsov has been sentenced to 2.5 years in prison.

According to the report, Firsov has been running a Dark web market, that provides all kinds of services to different cybercriminals. And not only that even the court affirmed that Firsov has been selling all the personal data regarding the credit cards, phone numbers, and social security numbers.

Apart from all this, the US Department of Justice also claimed that Firsov has been operating this illegal working website since October 2013. After investigating the report pronounced that nearly 3 thousand active stores with around a total of 17 million of turnover.

Hacker Jailed for Running a Darkweb Market Place

On March 7 in New York Firsov got arrested, and after that, he continues to be held in custody by the security authorities. Here, the US department stated that all the data that has been collected by Kirill Viktorovich Firsov is used for all criminal purposes.

Not only this but the US department of justice also claimed that the website that was being operated by Firsov was named “Deer[.]io, and hosted more than 24,000 online stores on a basis of subscription, which has a different course in its lifetime. 

The platform hosted approximately 3,000 active shops with sales exceeding $17 million. 

Moreover, the law enforcement has detected some stolen accounts that were on sale, the accounts include different names, addresses, telephone numbers, and Social Security numbers. 

To know all the key details of Firsov, the FBI purchased some accounts from the website. And on March 4, 2020, the FBI has acquired 1100 gamer accounts, after that on March 5, 2020, the FBI acquired the personal information of over 3,600 US citizens.

After purchasing different accounts, the FBI came to know that there are many victims that belong from the US and Europe. The supervising US District Judge Cynthia Bashant noted that Firsov has previously spent 15 months in the US prison system, while the severe COVID-19 pandemic mopped the whole world. 

Firsov was charged for “Unauthorized Solicitation of Access Devices,” on January 21, 2021, and it’s a charge for which any criminal can get a maximum punishment of 10 years in prison or a hefty fine of $250,000.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...