Unknown 2019-05-03 00:00:00 UTC

accused of running wallstreet market place on deepweb.

Rita Alielnour2019-04-30 00:00:00 UTC

According to documents in the case, Alielnour participated in an email compromise and account takeover scheme that obtained over $335,000 during a two-day period in April 2017. As part of the scheme, Alielnour opened a bank account in the name of a non-existent business to receive fraudulent wire transfers. A victim in the Northern District of Indiana was tricked into wiring $282,000 for a down payment on a home into Alielnour’s bank account after members of the scheme spoofed the escrow officer’s email address and provided false wire instructions. A victim in Texas was tricked into wiring nearly $25,000 into Alielnour’s account believing it was payment of a business invoice. A second victim in Texas had his bank account compromised, and an unknown person wired money into Alielnour’s account.

Ravid Yosef2019-04-30 00:00:00 UTC

allegedly ran a shadow bank that processed hundreds of millions of dollars of unregulated transactions on behalf of numerous cryptocurrency exchanges

James Alger2019-04-29 00:00:00 UTC

from 2016 to 2018, he messaged over 1,000 women he found through social media in an effort to obtain sexually explicit videos and pictures of them.

Lawrence Espaillat2019-04-24 00:00:00 UTC

From March 2017 to June 2018, Espaillat, conspirators Corry Pringley and Amanda Suazo, and others participated in the scheme to steal more than $1 million dollars from individual and corporate victims. The scheme involved recruiting “mules” – including Espaillat, before he rose to the level of recruiter – Suazo and Pringley, to provide their personal identifying information. This information was used to incorporate sham businesses with the N.J. Department of the Treasury under the mules’ names. The mules eventually opened bank accounts in the names of the sham corporations.

Lucson Appolon2019-04-16 00:00:00 UTC

According to the indictment, the defendants accessed victims’ personal identifying information, including names, Social Security numbers, dates of birth, and addresses on the “dark web” and then used the information to open credit cards in the victims’ names. The defendants then subscribed to Informed Delivery using the victims’ personal identifying information and a fraudulent email address created to track the delivery of credit cards to the victims’ residential mailboxes. The defendants subsequently intercepted the credit cards at the victims’ mailboxes before the victims could receive them and used those credit cards at ATMs and to purchase gift cards and other items for resale at retail establishments. The defendants traveled to states across the East Coast in furtherance of the fraud, including New Hampshire, Maine and Massachusetts.

Brandon Theresa2019-04-16 00:00:00 UTC

long term cyberstalking campaign

Julian Assange2019-04-11 00:00:00 UTC

The indictment alleges that in March 2010, Assange engaged in a conspiracy with Chelsea Manning, a former intelligence analyst in the U.S. Army, to assist Manning in cracking a password stored on U.S. Department of Defense computers connected to the Secret Internet Protocol Network (SIPRNet), a U.S. government network used for classified documents and communications. Manning, who had access to the computers in connection with her duties as an intelligence analyst, was using the computers to download classified records to transmit to WikiLeaks. Cracking the password would have allowed Manning to log on to the computers under a username that did not belong to her. Such a deceptive measure would have made it more difficult for investigators to determine the source of the illegal disclosures.

Timothy Smith2019-04-09 00:00:00 UTC

Mobile Man Federally Indicted for Cyber Intrusion and Theft of Trade Secrets from Pensacola Company

Hossein Heydari2019-04-06 00:00:00 UTC

“Mr. Heydari’s illegal intrusion of the Oregon Medicaid system posed a serious risk to public health, jeopardizing patient medical exams, diagnoses and treatment,” said Billy J. Williams, U.S. Attorney for the District of Oregon. “If not properly secured, network insiders can pose a serious cyber threat to businesses and government agencies alike.”

Kristian O’Hara2019-04-03 00:00:00 UTC

According to court documents and statements made in open court, O’Hara engaged in an eighteen-month course of conduct, which occurred in Delaware, New Jersey, and New York, and which involved the harassment and intimidation of a former classmate of O’Hara’s, as well as the classmate’s parents and classmate’s romantic partner. O’Hara further admitted that he also engaged in cyberstalking conduct against other victims throughout this period, including former high school classmates, office co-workers, and others who rejected his advances.

Unknown 2019-04-03 00:00:00 UTC

accused of running wallstreet market place on deepweb.

Unknown 2019-04-03 00:00:00 UTC

accused of running wallstreet market place on deepweb.

Chase Colasurdo2019-04-01 00:00:00 UTC

accused of making threats to kill via social media

Reginald Fowler2019-04-01 00:00:00 UTC

allegedly ran a shadow bank that processed hundreds of millions of dollars of unregulated transactions on behalf of numerous cryptocurrency exchanges

Liam Watts2019-03-26 00:00:00 UTC

ddosed multi police public websites taking them offline for a small amount of time.

Ryan Gustafson2019-03-22 00:00:00 UTC

International Counterfeit Currency Operation Headquartered in Uganda

Konstantin Ignatov2019-03-08 00:00:00 UTC

RUJA IGNATOVA2019-03-08 00:00:00 UTC

accused of being the CEO for OneCoin

Mark Scott2019-03-08 00:00:00 UTC

Bishap Mittal2019-03-01 00:00:00 UTC

accused of a multi year multi million dollar tech support scam.

Kevin Prósperes-Sosa2019-03-01 00:00:00 UTC

accused of cyberstalking and making threats to various young women.

Andrew Simet2019-02-28 00:00:00 UTC

Accused of using social media to make threats to law enforcement and judges.

Robert O’Rourke2019-02-28 00:00:00 UTC

According to evidence at trial, O’Rourke since 1984 worked for Dura-Bar, a Woodstock-based manufacturer of continuous cast-iron products. O’Rourke held the positions of plant metallurgist, quality assurance manager and salesperson, and helped the company develop business in China and other locations. In late 2013, he began several months of negotiations to take a similar job with a rival firm in Jiangsu, China, eventually accepting the position of Vice President. Evidence at trial revealed that in September 2015, while still employed with Dura-Bar, O’Rourke accepted the job offer in China. He then downloaded electronic data and documents belonging to Dura-Bar without authorization two days before officially leaving the company. The following week, he packed up the proprietary information and went to O’Hare International Airport in Chicago to board a flight to China. Federal authorities intervened at the airport and seized the stolen trade secrets from O’Rourke before he could travel to China.

Sergiy Usatyuk2019-02-27 00:00:00 UTC

According to the criminal information, Sergiy P. Usatyuk, 20, combined with a co-conspirator to develop, control and operate a number of booter services and booter-related websites from around August 2015 through November 2017 that launched millions of DDoS attacks that disrupted the internet connections of targeted victim computers, rendered targeted websites slow or inaccessible, and interrupted normal business operations. For instance, as of Sept. 12, 2017, ExoStresser advertised on its website ( that its booter service alone had launched 1,367,610 DDoS attacks, and caused targeted victim computer systems to suffer 109,186.4 hours of network downtime.

Randall Crater2019-02-27 00:00:00 UTC

Tanya English2019-02-27 00:00:00 UTC

accused of operating a large wire fraud scheme from 2013 till caught in 2017

Vishwanath Akuthota2019-02-22 00:00:00 UTC

In pleading guilty, Akuthota admitted that on February 14, 2019, he inserted a “USB Killer” device into 66 computers, as well as numerous computer monitors and computer-enhanced podiums, owned by the college in Albany. The “USB Killer” device, when inserted into a computer’s USB port, sends a command causing the computer’s on-board capacitors to rapidly charge and then discharge repeatedly, thereby overloading and physically destroying the computer’s USB port and electrical system.

Ruiyang Li2019-02-15 00:00:00 UTC

accused of selling counterfeit computer parts

Kevin McRae2019-02-08 00:00:00 UTC

Accused of cyber stalking a fellow US-air force member.