Organization Incidents

OneCoin2019-08-01 00:00:00 UTC

ponzi crypto scheme company registered in multipul countrys

F9 Advertising LLC2019-05-17 00:00:00 UTC

a for profit limited liability company organized in Puerto Rico in May 2014

My Big Coin Pay Inc2019-02-27 00:00:00 UTC

My Big Coin Pay Inc

Skycom Tech Co. Ltd2019-02-28 00:00:00 UTC

Skycom Tech Co. Ltd

Huawei Device USA Inc2019-01-28 00:00:00 UTC

Huawei Device USA Inc

First Choice Tech Support, LLC2017-11-16 00:00:00 UTC

First Choice Tech Support, LLC

Client Care Experts, LLC2017-11-16 00:00:00 UTC

Client Care Experts, LLC

Global Web Promotions Pty Ltd2005-09-20 00:00:00 UTC

ordered to halt all services

Rafotech2017-07-27 00:00:00 UTC

9 employees linked to fireball malware.

Denali Advanced Integration2017-03-18 00:00:00 UTC

former employee accused of hacking to benifit denaliai

Axact2016-12-19 00:00:00 UTC

Connected to a worldwide “diploma mill” scheme that collected at least approximately $140 million from tens of thousands of consumers. Axact promoted and claimed to have an affiliation with approximately 350 fictitious high schools and universities, which Axact advertised online to consumers as genuine schools. During certain time periods since 2014, Axact received approximately 5,000 phone calls per day from individuals seeking to purchase Axact products or enroll in educational institutions supposedly affiliated with Axact. At least some of those consumers appeared to believe that they were calling phone numbers associated with the respective schools. When consumers asked where the schools were located, sales representatives were instructed to give fictitious addresses. Once a consumer paid for a school certificate or diploma that falsely reflected a completed course of study, Axact sales agents were trained to use sales techniques to convince the consumer that the consumer should also purchase additional “accreditation” or “certifications” for such certificates or diplomas in order to make them appear more legitimate. Axact, through HAMID and his co-conspirators, falsely “accredited” purported colleges and other educational institutions by arranging to have diplomas from these phony educational institutions affixed with fake stamps supposedly bearing the seal and signature of the U.S. Secretary of State, as well as various states and state agencies and federal and state officials.

Quadsys2016-07-21 00:00:00 UTC

Accused of hacking into a rival re-seller and stealing pricing information as well as other data.

NXGN2005-09-01 00:00:00 UTC

accused of hacking competitors websites

Prime Technologies LLC2016-04-29 00:00:00 UTC

accused phone scam, told them their computers had been hacked and were infected with a virus from Russia or Nigeria, and charged them anywhere from $200 to more than $15,000 to remove the virus and receive technical support.

WTSP1989-05-15 00:00:00 UTC

2 news team members hacked competitor and as a result an out of court settlement was reach with WTSP agreed to pay the state $750,000 in an out-of-court settlement for tapping into another stations computer system, even though the station and its owners were never charged with any wrongdoing.

Rove Digital2011-11-01 00:00:00 UTC

Advertising company who used a malware based DNS changer to gather ghost clicks on a range of sites it had controlled for advertising purposes.

Encrypted Network Communications2016-04-19 00:00:00 UTC

Prosecutors the business was being used to manage illegal activities, including money laundering, and so they decided to shut the network.

Black Cube2016-04-03 00:00:00 UTC

The founders have been accused of cyber attacks on one of Romanias top legal prosecutes

Western Express International Inc2007-11-07 00:00:00 UTC

The Western Express Cybercrime Group, was a multinational, Internet-based cybercrime group composed of vendors, buyers, cybercrime services providers, and money movers located in numerous countries, ranging from Ukraine and throughout Eastern Europe to the United States.

Tiversa2016-03-17 00:00:00 UTC

The Federal Bureau of Investigation raided Tiversa’s Pittsburgh headquarters in early March and seized documents, the people said. The Justice Department’s criminal investigation of Tiversa began after Richard Wallace, a former Tiversa employee, alleged in a 2015 Federal Trade Commission hearing that the cybersecurity firm gave the agency doctored evidence purporting to prove corporate data breaches, the people said. Wallace testified that Tiversa falsified information to make it appear that sensitive data was being accessed by users across the country. Tiversas information led the FTC to examine whether companies failed to protect consumer data, according to testimony from Wallace and people with knowledge of the FTC inquiries, which can lead to civil charges and settlements with the companies. David Schertler, an attorney at Schertler and Onorato LLP who is representing Tiversa, said the company is cooperating with the investigation.

ALIBRIS/INTERLOC1999-11-22 00:00:00 UTC

The Information alleges that ALIBRIS’s corporate predecessor, INTERLOC, INC. "INTERLOC", was an on-line bookseller, and also operated a business called Valinet, which provided Internet service in the Greenfield, Massachusetts area. INTERLOC provided e-mail service to its customer book dealers. The Information alleges that for periods of time between January and June 1998, ALIBRIS/INTERLOC intercepted e-mail messages directed by online bookseller Amazon.com to ALIBRIS/INTERLOC bookseller clients which had INTERLOC e-mail addresses. The Information alleges that the purpose of the interception was, in part, to gain competitive commercial advantage for ALIBRIS/INTERLOC’s own online book-selling business by compiling a database of dealers’ purchases and to analyze the book-selling market. In January of 1998, INTERLOC altered its e-mail service so that it automatically intercepted and stored e-mail addressed from Amazon.com to INTERLOC’s book dealer customers. The Information alleges that in a matter of weeks INTERLOC intercepted and copied thousands of e-mail communications to which INTERLOC was not a party and was not entitled. The Information also alleges that INTERLOC obtained and retained unauthorized copies of the confidential and proprietary password files and customer lists of its competitor Internet service providers. U.S. Attorney Stern stated: "In this case, an Internet service provider intercepted mail passing through its network to gain a business advantage. The continued growth of e-commerce depends on the security of electronic transactions. We are committed to prosecuting the electronic theft of valuable intangible business property with the same vigor we have applied to the theft of valuable physical property in the past." ALIBRIS cooperated fully in the government’s investigation. No confidential customer financial information was obtained or misused.

TCNISO2009-09-10 00:00:00 UTC

selling tools that allow people to modify cable modems so they would appear to be paying subscribers and to remove filters that control Internet speed and content.

Mersad Company2016-03-23 00:00:00 UTC

Employees have been accused of attacks on united states

ITSecTeam2016-03-24 00:00:00 UTC

Employees have been linked to ddos attacks on united states.

25th Floor2015-11-01 00:00:00 UTC

According to the Russian authorities, 25th Floor was allegedly involved in distributing the notorious password-stealing malware known as Dyre Banking Trojan.

Total Transportation Services2013-03-01 00:00:00 UTC

According to the evidence submitted at trial, from 2002 to 2004, Musacchio was the president of Exel Transportation Services, a third party logistics or intermodal transportation company that facilitated links between shippers and common carriers in the manufacturing, retail and consumer industries. In 2004, Musacchio left Exel to form a competing company, Total Transportation Services, where he was the original president and CEO. Two other former Exel employees, Joseph Roy Brown and John Michael Kelly, also went to work at Musacchio’s new company. Trial testimony and exhibits established that between 2004 and 2006, Musacchio, Brown and Kelly engaged in a scheme to hack into Exel’s computer system for the purpose of conducting corporate espionage. Through their repeated unauthorized accesses into Exel’s email accounts, the co-conspirators were able to obtain Exel’s confidential and proprietary business information and use it to benefit themselves and their new employer.

Orbit Communication Corp2004-05-08 00:00:00 UTC

A federal grand jury indicted Saad "Jay" Echouafni, 37, the former chief executive of Sudbury, Mass.-based Orbit Communication Corp., on charges of hiring the hackers to take down the Web sites of a large television services company called weaknees.com. The attacks, FBI investigators said, made the companys Web site temporarily unavailable, as well as the Web sites for Amazon.com and the Department of Homeland Security. The attacks caused more than $2 million in damage, prosecutors said.

A Whole Lot of Nothing LLC2015-12-15 00:00:00 UTC

a business that specialized in sending unsolicited, or “spam,” emails on behalf of its clients. Livingston’s clients included legitimate businesses, such as insurance companies that wished to send bulk emails to advertise their businesses, as well as illegal entities, such as online pharmacies that sold narcotics without prescriptions. Typically, Livingston charged $5 to $9 for each spam email that resulted in a completed transaction for a client.

Oilpro2016-03-23 00:00:00 UTC

As alleged, David Kent hacked into a competitor’s database and stole information from over 700,000 customer accounts. Later he allegedly tried to use the proprietary information to defraud that same company.