OneCoin2019-08-01 00:00:00 UTC
ponzi crypto scheme company registered in multipul countrys
F9 Advertising LLC2019-05-17 00:00:00 UTC
a for profit limited liability company organized in Puerto Rico in May 2014
My Big Coin Pay Inc2019-02-27 00:00:00 UTC
My Big Coin Pay Inc
Skycom Tech Co. Ltd2019-02-28 00:00:00 UTC
Skycom Tech Co. Ltd
Huawei Device USA Inc2019-01-28 00:00:00 UTC
Huawei Device USA Inc
First Choice Tech Support, LLC2017-11-16 00:00:00 UTC
First Choice Tech Support, LLC
Client Care Experts, LLC2017-11-16 00:00:00 UTC
Client Care Experts, LLC
Global Web Promotions Pty Ltd2005-09-20 00:00:00 UTC
ordered to halt all services
Rafotech2017-07-27 00:00:00 UTC
9 employees linked to fireball malware.
Denali Advanced Integration2017-03-18 00:00:00 UTC
former employee accused of hacking to benifit denaliai
Axact2016-12-19 00:00:00 UTC
Connected to a worldwide â€œdiploma millâ€ scheme that collected at least approximately $140 million from tens of thousands of consumers. Axact promoted and claimed to have an affiliation with approximately 350 fictitious high schools and universities, which Axact advertised online to consumers as genuine schools. During certain time periods since 2014, Axact received approximately 5,000 phone calls per day from individuals seeking to purchase Axact products or enroll in educational institutions supposedly affiliated with Axact. At least some of those consumers appeared to believe that they were calling phone numbers associated with the respective schools. When consumers asked where the schools were located, sales representatives were instructed to give fictitious addresses. Once a consumer paid for a school certificate or diploma that falsely reflected a completed course of study, Axact sales agents were trained to use sales techniques to convince the consumer that the consumer should also purchase additional â€œaccreditationâ€ or â€œcertificationsâ€ for such certificates or diplomas in order to make them appear more legitimate. Axact, through HAMID and his co-conspirators, falsely â€œaccreditedâ€ purported colleges and other educational institutions by arranging to have diplomas from these phony educational institutions affixed with fake stamps supposedly bearing the seal and signature of the U.S. Secretary of State, as well as various states and state agencies and federal and state officials.
Quadsys2016-07-21 00:00:00 UTC
Accused of hacking into a rival re-seller and stealing pricing information as well as other data.
NXGN2005-09-01 00:00:00 UTC
accused of hacking competitors websites
Prime Technologies LLC2016-04-29 00:00:00 UTC
accused phone scam, told them their computers had been hacked and were infected with a virus from Russia or Nigeria, and charged them anywhere from $200 to more than $15,000 to remove the virus and receive technical support.
WTSP1989-05-15 00:00:00 UTC
2 news team members hacked competitor and as a result an out of court settlement was reach with WTSP agreed to pay the state $750,000 in an out-of-court settlement for tapping into another stations computer system, even though the station and its owners were never charged with any wrongdoing.
Rove Digital2011-11-01 00:00:00 UTC
Advertising company who used a malware based DNS changer to gather ghost clicks on a range of sites it had controlled for advertising purposes.
Encrypted Network Communications2016-04-19 00:00:00 UTC
Prosecutors the business was being used to manage illegal activities, including money laundering, and so they decided to shut the network.
Black Cube2016-04-03 00:00:00 UTC
The founders have been accused of cyber attacks on one of Romanias top legal prosecutes
Western Express International Inc2007-11-07 00:00:00 UTC
The Western Express Cybercrime Group, was a multinational, Internet-based cybercrime group composed of vendors, buyers, cybercrime services providers, and money movers located in numerous countries, ranging from Ukraine and throughout Eastern Europe to the United States.
Tiversa2016-03-17 00:00:00 UTC
The Federal Bureau of Investigation raided Tiversaâ€™s Pittsburgh headquarters in early March and seized documents, the people said. The Justice Departmentâ€™s criminal investigation of Tiversa began after Richard Wallace, a former Tiversa employee, alleged in a 2015 Federal Trade Commission hearing that the cybersecurity firm gave the agency doctored evidence purporting to prove corporate data breaches, the people said. Wallace testified that Tiversa falsified information to make it appear that sensitive data was being accessed by users across the country. Tiversas information led the FTC to examine whether companies failed to protect consumer data, according to testimony from Wallace and people with knowledge of the FTC inquiries, which can lead to civil charges and settlements with the companies. David Schertler, an attorney at Schertler and Onorato LLP who is representing Tiversa, said the company is cooperating with the investigation.
ALIBRIS/INTERLOC1999-11-22 00:00:00 UTC
The Information alleges that ALIBRISâ€™s corporate predecessor, INTERLOC, INC. "INTERLOC", was an on-line bookseller, and also operated a business called Valinet, which provided Internet service in the Greenfield, Massachusetts area. INTERLOC provided e-mail service to its customer book dealers. The Information alleges that for periods of time between January and June 1998, ALIBRIS/INTERLOC intercepted e-mail messages directed by online bookseller Amazon.com to ALIBRIS/INTERLOC bookseller clients which had INTERLOC e-mail addresses. The Information alleges that the purpose of the interception was, in part, to gain competitive commercial advantage for ALIBRIS/INTERLOCâ€™s own online book-selling business by compiling a database of dealersâ€™ purchases and to analyze the book-selling market. In January of 1998, INTERLOC altered its e-mail service so that it automatically intercepted and stored e-mail addressed from Amazon.com to INTERLOCâ€™s book dealer customers. The Information alleges that in a matter of weeks INTERLOC intercepted and copied thousands of e-mail communications to which INTERLOC was not a party and was not entitled. The Information also alleges that INTERLOC obtained and retained unauthorized copies of the confidential and proprietary password files and customer lists of its competitor Internet service providers. U.S. Attorney Stern stated: "In this case, an Internet service provider intercepted mail passing through its network to gain a business advantage. The continued growth of e-commerce depends on the security of electronic transactions. We are committed to prosecuting the electronic theft of valuable intangible business property with the same vigor we have applied to the theft of valuable physical property in the past." ALIBRIS cooperated fully in the governmentâ€™s investigation. No confidential customer financial information was obtained or misused.
TCNISO2009-09-10 00:00:00 UTC
selling tools that allow people to modify cable modems so they would appear to be paying subscribers and to remove filters that control Internet speed and content.
Mersad Company2016-03-23 00:00:00 UTC
Employees have been accused of attacks on united states
ITSecTeam2016-03-24 00:00:00 UTC
Employees have been linked to ddos attacks on united states.
25th Floor2015-11-01 00:00:00 UTC
According to the Russian authorities, 25th Floor was allegedly involved in distributing the notorious password-stealing malware known as Dyre Banking Trojan.
Total Transportation Services2013-03-01 00:00:00 UTC
According to the evidence submitted at trial, from 2002 to 2004, Musacchio was the president of Exel Transportation Services, a third party logistics or intermodal transportation company that facilitated links between shippers and common carriers in the manufacturing, retail and consumer industries. In 2004, Musacchio left Exel to form a competing company, Total Transportation Services, where he was the original president and CEO. Two other former Exel employees, Joseph Roy Brown and John Michael Kelly, also went to work at Musacchioâ€™s new company. Trial testimony and exhibits established that between 2004 and 2006, Musacchio, Brown and Kelly engaged in a scheme to hack into Exelâ€™s computer system for the purpose of conducting corporate espionage. Through their repeated unauthorized accesses into Exelâ€™s email accounts, the co-conspirators were able to obtain Exelâ€™s confidential and proprietary business information and use it to benefit themselves and their new employer.
Orbit Communication Corp2004-05-08 00:00:00 UTC
A federal grand jury indicted Saad "Jay" Echouafni, 37, the former chief executive of Sudbury, Mass.-based Orbit Communication Corp., on charges of hiring the hackers to take down the Web sites of a large television services company called weaknees.com. The attacks, FBI investigators said, made the companys Web site temporarily unavailable, as well as the Web sites for Amazon.com and the Department of Homeland Security. The attacks caused more than $2 million in damage, prosecutors said.
A Whole Lot of Nothing LLC2015-12-15 00:00:00 UTC
a business that specialized in sending unsolicited, or â€œspam,â€ emails on behalf of its clients. Livingstonâ€™s clients included legitimate businesses, such as insurance companies that wished to send bulk emails to advertise their businesses, as well as illegal entities, such as online pharmacies that sold narcotics without prescriptions. Typically, Livingston charged $5 to $9 for each spam email that resulted in a completed transaction for a client.
Oilpro2016-03-23 00:00:00 UTC
As alleged, David Kent hacked into a competitorâ€™s database and stole information from over 700,000 customer accounts. Later he allegedly tried to use the proprietary information to defraud that same company.