Russian FSB Counterintelligence Chief Will get 9 Years in Cybercrime Bribery Scheme – Krebs on Safety

Russian FSB Counterintelligence Chief Will get 9 Years in Cybercrime Bribery Scheme – Krebs on Safety
Russian FSB Counterintelligence Chief Will get 9 Years in Cybercrime Bribery Scheme – Krebs on Safety


The pinnacle of counterintelligence for a division of the Russian Federal Safety Service (FSB) was sentenced final week to 9 years in a penal colony for accepting a USD $1.7 million bribe to disregard the actions of a prolific Russian cybercrime group that hacked hundreds of e-commerce web sites. The safety scheme was uncovered in 2022 when Russian authorities arrested six members of the group, which offered tens of millions of stolen fee playing cards at flashy on-line retailers like Trump’s Dumps.

A now-defunct carding store that offered stolen bank cards and invoked 45’s likeness and identify.

As reported by The Document, a Russian court docket final week sentenced former FSB officer Grigory Tsaregorodtsev for taking a $1.7 million bribe from a cybercriminal group that was searching for a “roof,” a well-placed, corrupt regulation enforcement official who could possibly be counted on to each disregard their unlawful hacking actions and run interference with authorities within the occasion of their arrest.

Tsaregorodtsev was head of the counterintelligence division for a division of the FSB based mostly in Perm, Russia. In February 2022, Russian authorities arrested six men in the Perm region accused of promoting stolen fee card information. Additionally they seized a number of carding retailers run by the gang, together with Ferum Store, Sky-Fraud, and Trump’s Dumps, a well-liked fraud retailer that invoked the forty fifth president’s likeness and promised to “make bank card fraud nice once more.”

All the domains seized in that raid had been registered by an IT consulting firm in Perm known as Get-net LLC, which was owned partially by Artem Zaitsev — one of many six males arrested. Zaitsev reportedly was a well known programmer whose firm equipped providers and leasing to the native FSB area workplace.

The message for Trump’s Dumps customers left behind by Russian authorities that seized the area in 2022.

Russian information websites report that Inside Affairs officers with the FSB grew suspicious when Tsaregorodtsev turned a bit too within the case following the hacking group’s arrests. The previous FSB agent had reportedly assured the hackers he might have their case transferred and that they’d quickly be free.

However when that promised freedom didn’t materialize, 4 the of the defendants pulled the partitions down on the scheme and introduced down their very own roof. The FSB arrested Tsaregorodtsev, and seized $154,000 in money, 100 gold bars, actual property and costly vehicles.

At Tsaregorodtsev’s trial, his legal professionals argued that their consumer wasn’t responsible of bribery per se, however that he did admit to fraud as a result of he was in the end unable to totally carry out the providers for which he’d been employed.

The Russian information outlet Kommersant reviews that every one 4 of those that cooperated had been launched with probation or correctional labor. Zaitsev acquired a sentence of three.5 years in jail, and defendant Alexander Kovalev obtained 4 years.

In 2017, KrebsOnSecurity profiled Trump’s Dumps, and located the contact tackle listed on the location was tied to an e-mail tackle used to register greater than a dozen domains that had been made to appear like professional Javascript calls many e-commerce websites routinely make to course of transactions — reminiscent of “js-link[dot]su,” “js-stat[dot]su,” and “js-mod[dot]su.”

Looking on these malicious domains revealed a 2016 report from RiskIQ, which reveals the domains featured prominently in a collection of hacking campaigns towards e-commerce web sites. In response to RiskIQ, the assaults focused on-line shops working outdated and unpatched variations of buying cart software program from Magento, Powerfront and OpenCart.

These buying cart flaws allowed the crooks to put in “net skimmers,” malicious Javascript used to steal bank card particulars and different data from fee types on the checkout pages of weak e-commerce websites. The stolen buyer fee card particulars had been then offered on websites like Trump’s Dumps and Sky-Fraud.

Leave a Reply

Your email address will not be published. Required fields are marked *