Tuesday, July 16, 2024
EHA

Russian Hacker Jailed for Running a Darkweb Market Place that Sells Stolen Credit card Details

The Russian citizen Kirill Victorovich Firsov has been sentenced to jail by the Southern District Court of California, and Firsov has been sentenced to 2.5 years in prison.

According to the report, Firsov has been running a Dark web market, that provides all kinds of services to different cybercriminals. And not only that even the court affirmed that Firsov has been selling all the personal data regarding the credit cards, phone numbers, and social security numbers.

Apart from all this, the US Department of Justice also claimed that Firsov has been operating this illegal working website since October 2013. After investigating the report pronounced that nearly 3 thousand active stores with around a total of 17 million of turnover.

Hacker Jailed for Running a Darkweb Market Place

On March 7 in New York Firsov got arrested, and after that, he continues to be held in custody by the security authorities. Here, the US department stated that all the data that has been collected by Kirill Viktorovich Firsov is used for all criminal purposes.

Not only this but the US department of justice also claimed that the website that was being operated by Firsov was named “Deer[.]io, and hosted more than 24,000 online stores on a basis of subscription, which has a different course in its lifetime. 

The platform hosted approximately 3,000 active shops with sales exceeding $17 million. 

Moreover, the law enforcement has detected some stolen accounts that were on sale, the accounts include different names, addresses, telephone numbers, and Social Security numbers. 

To know all the key details of Firsov, the FBI purchased some accounts from the website. And on March 4, 2020, the FBI has acquired 1100 gamer accounts, after that on March 5, 2020, the FBI acquired the personal information of over 3,600 US citizens.

After purchasing different accounts, the FBI came to know that there are many victims that belong from the US and Europe. The supervising US District Judge Cynthia Bashant noted that Firsov has previously spent 15 months in the US prison system, while the severe COVID-19 pandemic mopped the whole world. 

Firsov was charged for “Unauthorized Solicitation of Access Devices,” on January 21, 2021, and it’s a charge for which any criminal can get a maximum punishment of 10 years in prison or a hefty fine of $250,000.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These...

New ShadowRoot Ransomware Attacking Business Via Weaponized PDF’s

X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails...

Hacktivist Groups Preparing for DDoS Attacks Targeting Paris Olympics

Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the...

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles