Incidents

Umar Ahmad2020-08-25 00:00:00 UTC

accused of being apart of sparks piracy group

Boris Timokhin2018-11-28 00:00:00 UTC

charged along with 13 others for ddos scheme

Mikhail Andreev2018-11-28 00:00:00 UTC

charged along with 13 others for a ddos cheme

Denis Andeev2018-11-28 00:00:00 UTC

charged along with 13 others for a ddos scheme

Dmitry Novikov2018-11-28 00:00:00 UTC

charged along with 13 others for a ddos scheme

Sergey Ovsyannikov2018-11-28 00:00:00 UTC

charged along with 8 others for ddos scheme

Aleksandr Isaev2018-11-28 00:00:00 UTC

charged along with 8 others for a ddos scheme

Arash Abedia2017-08-08 00:00:00 UTC

used malicious software, or “malware,” to capture the credit card and other personal information of individuals who had transacted with certain merchants’ websites. Abedian then used that information to commit identity theft and to obtain goods and services by fraud, and, on some occasions, Abedian then transmitted the stolen information to Jeloudar. The superseding indictment further alleges that, in January 2017, Jeloudar contacted a California-based online merchant and threatened to disclose its customers’ credit card numbers and other related information previously obtained by hacking the merchant‘s website, unless it made a Bitcoin payment to Jeloudar. Jeloudar also threatened to disclose to the company’s customers that their private information had been compromised and launched a denial-of-service attack on the company’s website.

Danial Jeloudar2017-08-08 00:00:00 UTC

Abedian sent Jeloudar approximately 30,000 names and numbers, which he said were unauthorized credit card numbers and associated information. As part of the conspiracy, in or around March 2012 and April 2012, Jeloudar ordered and obtained various equipment, servers, and internet hosting services from a provider in South Carolina using stolen credit card numbers and other personal identifiers.

Mohammed Rezakhah2017-07-17 00:00:00 UTC

October 2012, Rezakhah hacked a Vermont-based engineering consulting and software design company best known for its software that supports aerodynamics analysis and design for projectiles. This software is designated as a “defense article” on the U.S. Munitions List of the International Traffic in Arms Regulations ITAR, meaning it cannot be exported from the U.S. without a license from the U.S. Department of State.

Mohammed Ajily2017-07-17 00:00:00 UTC

Ajily, a businessman, would task Rezakhah and others with stealing or unlawfully cracking particular pieces of valuable software. Rezakhah would then conduct unauthorized intrusions into victim networks to steal the desired software. Once the software was obtained, Ajily marketed and sold the software through various companies and associates to Iranian entities, including universities and military and government entities, specifically noting that such sales were in contravention of U.S. export controls and sanctions

Kelvin Onaghinor2016-12-16 00:00:00 UTC

Accused of launching an email phishing attack in May that targeted Los Angeles County employees from 15 departments.

Ahmad Fathi2016-03-24 00:00:00 UTC

Fathi was the leader of ITSEC and was responsible for supervising and coordinating ITSEC’s portion of the DDoS campaign, along with managing computer intrusion and cyberattack projects being conducted for the government of Iran.

Hamid Firoozi2016-03-24 00:00:00 UTC

Firoozi was the network manager at ITSEC and, in that role, procured and managed computer servers that were used to coordinate and direct ITSEC’s portion of the DDoS campaign. Between Aug. 28, 2013, and Sept. 18, 2013, Firoozi repeatedly obtained unauthorized access to the SCADA systems of the Bowman Dam, and is charged with one substantive count of obtaining and aiding and abetting computer hacking. This unauthorized access allowed him to repeatedly obtain information regarding the status and operation of the dam, including information about the water levels, temperature and status of the sluice gate, which is responsible for controlling water levels and flow rates. Although that access would normally have permitted Firoozi to remotely operate and manipulate the Bowman Dam’s sluice gate, Firoozi did not have that capability because the sluice gate had been manually disconnected for maintenance at the time of the intrusion.

Amin Shokohi2016-03-24 00:00:00 UTC

Shokohi is a computer hacker who helped build the botnet used by ITSEC to carry out its portion of the DDoS campaign and created malware used to direct the botnet to engage in those attacks. During the time that he worked in support of the DDoS campaign, Shokohi received credit for his computer intrusion work from the Iranian government towards his completion of his mandatory military service requirement in Iran.

Sadegh Ahmadzadegan2016-03-24 00:00:00 UTC

Ahmadzadegan was a co-founder of MERSAD and was responsible for managing the botnet used in MERSAD’s portion of the DDoS campaign. He was also associated with Iranian hacking groups Sun Army and the Ashiyane Digital Security Team ADST, and claimed responsibility for hacking servers belonging to the National Aeronautics and Space Administration NASA in February 2012. Ahmadzadegan has also provided training to Iranian intelligence personnel.

Omid Ghaffarinia2016-03-24 00:00:00 UTC

Ghaffarinia was a co-founder of MERSAD and created malicious computer code used to compromise computer servers and build MERSAD’s botnet. Ghaffarinia was also associated with Sun Army and ADST, and has also claimed responsibility for hacking NASA servers in February 2012, as well as thousands of other servers in the United States, the United Kingdom and Israel.

Sina Keissar2016-03-24 00:00:00 UTC

Keissar procured computer servers used by MERSAD to access and manipulate MERSAD’s botnet, and also performed preliminary testing of the same botnet prior to its use in MERSAD’s portion of the DDoS campaign.

Amad Agha2016-03-22 00:00:00 UTC

accused of being apart of SEA

Firas Dardar2016-03-22 00:00:00 UTC

accused of being apart of SEA

Peter Romar2016-03-22 00:00:00 UTC

accused of being apart of SEA by working with other members to extort money from victims, including online companies in the United States

Unknown 2016-01-27 00:00:00 UTC

German hacker who organized DDos-attacks on websites of the online stores to blackmail

Alexei Burkov2015-12-13 00:00:00 UTC

accused of hacking banking systems and other hacking incidents.

Joshua Aaron2015-11-10 00:00:00 UTC

Citizen and resident of Israel, but currently a fugitive. indicted after being accessed of taking part in one of the worlds biggest bank jobs ever. December 14th Joshua fly to united states and handed himself in.

Pavel Dubovoy2015-08-11 00:00:00 UTC

Accused of being apart of a scheme that stole news reports from 3 major press release vendors and totaled over 30M in illegal trading.

Ivan Turchynov2015-08-11 00:00:00 UTC

Accused of being apart of a scheme that stole news reports from 3 major press release vendors and totaled over 30M in illegal trading.

Oleksandr Ieremenko2015-08-11 00:00:00 UTC

Accused of being apart of a scheme that stole news reports from 3 major press release vendors and totaled over 30M in illegal trading.

Vladislav Khalupsky2015-08-11 00:00:00 UTC

Accused of being apart of a scheme that stole news reports from 3 major press release vendors and totaled over 30M in illegal trading.

Peter Locsin2015-06-18 00:00:00 UTC

Facing a bank fraud complaint in New Jersey, USA and one of his victims was the director of FBI.

Alusula Adilkan2015-04-29 00:00:00 UTC

Added to interpols wanted list for major computer crimes related to theft and fraud.