Incidents

Dmitry Korobov2015-12-28 00:00:00 UTC

Downloaded a piece of software codenamed Arcadia from Yandexs servers, which contained the source code and algorithms of the companys search engine. Later on, he tried to sell it to an electronics retailer called NIX, where a friend of his allegedly worked. Korobov also trawled the darknet in search of potential buyers.

Unknown 2015-12-27 00:00:00 UTC

hacking social media accounts and demanding ransoms after obtaining social media login information by using phishing.

Viktor Chostak2015-12-23 00:00:00 UTC

Accused of running a $10,000,000 fraud scheme and hiring computer hackers and money mules to do his dirty work.

Alonzo Knowles2015-12-22 00:00:00 UTC

Accused of hacking into celebrities email accounts to steal unreleased movie and TV scripts and private sex tapes and sought to peddle some of the scripts, boasting to an undercover agent that he had dossiers on at least 130 accounts of stars and bigshots in entertainment, sports and media

Unknown 2015-12-20 00:00:00 UTC

Suspected of hacking into a UK business, accessing confidential data and demanding and receiving a "ransom" paid in bitcoins - the cryptocurrency. Ireland police started investigation after UK police alert them to an incident related to UK Busniess and DDoS attacks.

Vincent Canfield2015-12-17 00:00:00 UTC

Owner of cock.li email provider who has been dragged into a possible extradition battle over his website and a user who sent an alledged bomb threat to a US school.

Unknown 2015-12-16 00:00:00 UTC

Accused of being apart of a cyber crime group dub as DD4BTC ddos for bitcoins who would extort companies with threats of ddos attacks unless they pay up.

Paul Suggs2015-12-15 00:00:00 UTC

According to the plea agreement, Suggs admitted that in September 2015, he made several posts on Facebook threatening to shoot a man in Moscow and to shoot law enforcement officers in Moscow and Pullman, Washington. Additionally Suggs posted that he was going to kill the family members of the officers.

Unknown 2015-12-15 00:00:00 UTC

Accused of vTech hack after some what ethically disclosing the issue to the public via motherboard.

Timothy Livingston2015-12-15 00:00:00 UTC

Beginning as early as 2011, Livingston and others allegedly operated A Whole Lot of Nothing LLC — a business that specialized in sending unsolicited, or “spam,” emails on behalf of its clients. Livingston’s clients included legitimate businesses, such as insurance companies that wished to send bulk emails to advertise their businesses, as well as illegal entities, such as online pharmacies that sold narcotics without prescriptions. Typically, Livingston charged $5 to $9 for each spam email that resulted in a completed transaction for a client.

Tomasz Chmielarz2015-12-15 00:00:00 UTC

Beginning as early as 2011, Livingston and others allegedly operated A Whole Lot of Nothing LLC — a business that specialized in sending unsolicited, or “spam,” emails on behalf of its clients. Livingston’s clients included legitimate businesses, such as insurance companies that wished to send bulk emails to advertise their businesses, as well as illegal entities, such as online pharmacies that sold narcotics without prescriptions. Typically, Livingston charged $5 to $9 for each spam email that resulted in a completed transaction for a client.

Devin McArthur2015-12-15 00:00:00 UTC

Beginning as early as 2011, Livingston and others allegedly operated A Whole Lot of Nothing LLC — a business that specialized in sending unsolicited, or “spam,” emails on behalf of its clients. Livingston’s clients included legitimate businesses, such as insurance companies that wished to send bulk emails to advertise their businesses, as well as illegal entities, such as online pharmacies that sold narcotics without prescriptions. Typically, Livingston charged $5 to $9 for each spam email that resulted in a completed transaction for a client.

Unknown 2015-12-15 00:00:00 UTC

Accused of being apart of a cyber crime group dub as DD4BTC ddos for bitcoins who would extort companies with threats of ddos attacks unless they pay up.

Unknown 2015-12-14 00:00:00 UTC

Accused of running RAT remote access tools MegalodonHTTP.

Unknown 2015-12-14 00:00:00 UTC

Accused of running RAT remote access tools MegalodonHTTP.

Unknown 2015-12-14 00:00:00 UTC

Accused of running RAT remote access tools MegalodonHTTP.

Unknown 2015-12-14 00:00:00 UTC

Accused of running RAT remote access tools MegalodonHTTP.

Unknown 2015-12-14 00:00:00 UTC

Accused of running RAT remote access tools MegalodonHTTP.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Daniel Pfeiffer2015-12-14 00:00:00 UTC

identified during the investigation as an individual who had utilized the Internet to create social media accounts in the name of a female acquaintance, without her knowledge or consent. As a result, numerous sexually explicit images of the female victim were uploaded by Pfeiffer to the fictitious accounts. Pfeiffer would then engage others in sexually explicit chats and sexual solicitations while pretending to be the female victim.

Unknown 2015-12-14 00:00:00 UTC

1 of 12 arrested in Operation Falling sTAR, a crackdown on malware and remote administrator trojans/tools.

Peter Lagreca2015-12-14 00:00:00 UTC

identified during the investigation as an individual who had also utilized the Internet to create social media accounts in the name of the same female victim, without her knowledge or consent. As a result, numerous sexually explicit images of the female victim were uploaded to the fictitious account. Lagreca would then engage others in sexually explicit chats and sexual solicitations while pretending to be the female victim.

Unknown 2015-12-13 00:00:00 UTC

1 of 7 arrested in crackdown on online gambling in india.

Unknown 2015-12-13 00:00:00 UTC

1 of 7 arrested in crackdown on online gambling in india.