Thursday, January 30, 2025
HomeCyber Security NewsRussian Hacker Sentenced to 12 years in Prison for his Role in...

Russian Hacker Sentenced to 12 years in Prison for his Role in an International Hacking Campaign

Published on

SIEM as a Service

Follow Us on Google News

The Acting United States Attorney for the Southern District of New York, Audrey Strauss, announced that “Andrei Tyurin,” a Russian Hacker was sentenced in Manhattan federal court to 144 months in prison for computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies.

An insight into the incident

Andrei Tyurin was accused of being the mastermind of the organization that targeted the US financial institution from 2012 to mid of 2015.

His major role in orchestrating and facilitating an international hacking campaign that included one of the largest thefts of U.S. customer data from a single financial institution in history, stealing the personal information of more than 80 million J.P. Morgan Chase customers.

“The conspiracy targeted major financial institutions, brokerage firms, news agencies, and other companies, and netted Tyurin over $19 million in criminal proceeds”, says the Acting U.S. Attorney Audrey Strauss.

Tyurin was responsible for the theft of personal information of over 100 million customers of the victim companies such as J.P. Morgan Chase Bank, E*Trade, Scottrade, and the Wall Street Journal.

In one such instance of security fraud, Tyurin collaborated with his partner Gery to artificially inflate the price of certain stocks publicly traded in the U.S., by marketing the stocks deceptively and misleadingly to customers of the targeted companies whose contact information was stolen during the intrusions.

The hacker also carried out cyberattacks against several U.S. and foreign companies in furtherance of various criminal enterprises operated by Shalon and his co-conspirators, including unlawful internet gambling businesses and international payment processors.

His hacking activity included the targeting of companies known to be used for email marketing campaigns, competitor online casinos, and a merchant risk intelligence firm based in the United States, in order for the co-conspirators to monitor the firm’s efforts to audit potentially criminal online credit card transactions on behalf of major credit card networks, and thus avoid detection of their criminal schemes.

He used computer infrastructure located across five continents, which he controlled from his home in Moscow, and maintained persistent access over an extended time to the victims’ networks, regularly refreshing the stolen data by frequently downloading information from these companies.

Once his hacking activities were detected, TYURIN worked with Shalon to destroy the evidence of their criminal activity and undermine U.S. law enforcement’s efforts to identify and arrest them.

“TYURIN, Shalon, and their co-conspirators obtained hundreds of millions of dollars in illicit proceeds, and TYURIN himself earned over $19 million in profits from his hacking activity”, reads the press release published by the DoJ.

The Justice Department said Tyurin has been ordered to forfeit over $19 million, with a court hearing on his restitution obligations scheduled for April 6.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Russian Hackers Breached US govt, FireEye in a Supply Chain Attack

FBI, CISA, ODNI, and NSA Says Russian Threat Actors Behind SolarWinds Hack

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...