24 Arrests In Eight Countries As Part Of International Cyber Crime Takedown

Rome0

Seller of:,  Dumps
Messages
795
Reputation
79
Reaction score
135
Points
43
FBI used Carderprofit board :D to get them . sad see people arrested , but when greedy ppl do carding 90% of time the end was behind bars for iPad ))))

Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of International Cyber Crime Takedown
FOR IMMEDIATE RELEASETuesday June 26, 2012
Two-Year FBI Undercover “Carding” Operation Protected Over 400,000 Potential Cyber Crime Victims and Prevented Over $205 Million in Losses

Preet Bharara, the United States Attorney for the Southern District of New York, and
Janice K. Fedarcyk, the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the largest coordinated international law enforcement action in history directed at “carding” crimes – offenses in which the Internet is used to traffic in and exploit the stolen credit card, bank account, and other personal identification information of hundreds of thousands of victims globally. Today’s coordinated action – involving 13 countries including the United States – resulted in 24 arrests, including the domestic arrests of 11 individuals by federal and local authorities in the United States, and the arrests of 13 individuals abroad by foreign law enforcement in seven countries. In addition, the federal and local authorities, and authorities overseas, today conducted more than 30 subject interviews, and executed more than 30 search warrants. Today’s coordinated actions result from a two-year undercover operation led by the FBI that was designed to locate cybercriminals, investigate and expose them, and disrupt their activities.

Eleven individuals were arrested today, and one last night, in the United States: CHRISTIAN CANGEOPOL, a/k/a “404myth,” was arrested today in Lawrenceville, Georgia, MARK CAPARELLI, a/k/a “Cubby,” was arrested in San Diego, California; SEAN HARPER, a/k/a “Kabraxis314,” was arrested in Albuquerque, New Mexico; ALEX HATALA a/k/a “kool+kake,” was arrested in Jacksonville, Florida; JOSHUA HICKS, a/k/a “OxideDox,” was arrested in Bronx, New York; MICHAEL HOGUE a/k/a “xVisceral,” was arrested in Tucson, Arizona; MIR ISLAM, a/k/a “JoshTheGod,” was arrested in Manhattan, New York; PETER KETCHUM, a/k/a “IwearaMAGNUM,” was arrested in Pittsfield, Massachusetts; STEVEN HANSEN a/k/a “theboner1,” was arrested in Wisconsin, where he is currently serving a prison sentence on state charges. In addition, two minors, whose names will not be made public, were arrested by local authorities in Long Beach and Sacramento, California. HICKS and ISLAM will be presented later today before a magistrate judge in the Southern District of New York. The other federally arrested defendants will be presented before magistrate judges in the corresponding federal districts of arrest.

Another 13 individuals were arrested today in seven foreign countries. Eleven of those individuals were arrested as a result of investigations commenced in foreign jurisdictions based in part on information arising out of the undercover operation and provided by the FBI to foreign law enforcement. Those 11 arrests occurred in: the United Kingdom (6 arrests), Bosnia (2), Bulgaria (1), Norway (1), and Germany (1). Two additional defendants were arrested today in foreign countries based on provisional arrest warrants obtained by the United States in connection with Complaints unsealed today in the Southern District of New York. Those two individuals are: ALI HASSAN, a/k/a/ “Badoo,” who was arrested in Italy; and LEE JASON JUESHENG, a/k/a “iAlert,” a/k/a “Jason Kato,” who was arrested in Japan. Australia, Canada, Denmark, and Macedonia conducted interviews, executed search warrants, or took other coordinated action in connection with today’s takedown, including.

Charges were also unsealed in the Southern District of New York against four additional defendants who remain at large.

Manhattan U.S. Attorney Preet Bharara said: “As the cyber threat grows more international, the response must be increasingly global and forceful. The coordinated law enforcement actions taken by an unprecedented number of countries around the world today demonstrate that hackers and fraudsters cannot count on being able to prowl the Internet in anonymity and with impunity, even across national boundaries. Clever computer criminals operating behind the supposed veil of the Internet are still subject to the long arm of the law.
The allegations unsealed today chronicle a breathtaking spectrum of cyber schemes and scams. As described in the charging documents, individuals sold credit cards by the thousands and took the private information of untold numbers of people. As alleged, the defendants casually offered every stripe of malware and virus to fellow fraudsters, even including software enabling cyber voyeurs to hijack an unsuspecting consumer's personal computer camera. To expose and prosecute individuals like the alleged cyber-criminals charged today will continue to require exactly the kind of coordinated response and international cooperation that made today’s arrests possible.”

FBI Assistant Director-in-Charge Janice K. Fedarcyk said: “From New York to Norway and Japan to Australia, Operation Card Shop targeted sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools. Spanning four continents, the two-year undercover FBI investigation is the latest example of our commitment to rooting out rampant criminal behavior on the Internet.

Cyber crooks trade contraband and advance their schemes online with impunity, and they will only be stopped by law enforcement’s continued vigilance and cooperation. Today’s arrests cause significant disruption to the underground economy and are a stark reminder that masked IP addresses and private forums are no sanctuary for criminals and are not beyond the reach of the FBI.”

The following allegations are based on the Complaints unsealed today in Manhattan federal court:

Background on “Carding” Crimes

“Carding” refers to various criminal activities associated with stealing personal identification information and financial information belonging to other individuals – including the account information associated with credit cards, bank cards, debit cards, or other access devices – and using that information to obtain money, goods, or services without the victims’ authorization or consent. For example, a criminal might gain unauthorized access to (or “hack”) a database maintained on a computer server and steal credit card numbers and other personal information stored in that database. The criminal can then use the stolen information to, among other things: buy goods or services online; manufacture counterfeit credit cards by encoding them with the stolen account information; manufacture false identification documents (which can be used in turn to facilitate fraudulent purchases); or sell the stolen information to others who intend to use it for criminal purposes. “Carding” refers to the foregoing criminal activity generally and encompasses a variety of federal offenses, including, but not limited to, identification document fraud, aggravated identity theft, access device fraud, computer hacking, and wire fraud.

“Carding forums” are websites used by criminals engaged in carding (“carders”) to facilitate their criminal activity. Carders use carding forums to, among other things: exchange information related to carding, such as information concerning hacking methods or computer-security vulnerabilities that could be used to obtain personal identification information; and to buy and sell goods and services related to carding, for example, stolen credit or debit card account numbers, hardware for creating counterfeit credit or debit cards, or goods bought with compromised credit card or debit card accounts. Carding forums often permit users to post public messages - postings that can be viewed by all users of the site - sometimes referred to as “threads.” For example, a user who has stolen credit card numbers may post a public “thread” offering to sell the numbers. Carding forums also often permit users to communicate one-to-one through so-called “private messages.” Because carding forums are, in essence, marketplaces for illegal activities, access is typically restricted to avoid law enforcement surveillance. Typically, a prospective user seeking to join a carding forum can only do so if other, already established users “vouch” for him or her, or if he or she pays a sum of money to the operators of the carding forum. User accounts are typically identified by a username and access is restricted by password. Users of carding forums typically identify themselves on such forums using aliases or online nicknames (“nics”).
Individuals who use stolen credit card information to purchase goods on the Internet are typically reluctant to ship the goods to their own home addresses, for fear that law enforcement could easily trace the purchases. Accordingly, carders often seek out “drop addresses” – addresses with which they have no association, such as vacant houses or apartments, where carded goods can be shipped and retrieved without leaving evidence of their involvement in the shipment.

Background on the Undercover Operation

In June 2010, the FBI established an undercover carding forum, called “Carder Profit” (the “UC Site”), enabling users to discuss various topics related to carding and to communicate offers to buy, sell, and exchange goods and services related to carding, among other things. Since individuals engaged in these unlawful activities on one of many other carding websites on the Internet, the FBI established the UC Site in an effort to identify these cybercriminals, investigate their crimes, and prevent harm to innocent victims. The UC Site was configured to allow the FBI to monitor and to record the discussion threads posted to the site, as well as private messages sent through the site between registered users. The UC Site also allowed the FBI to record the Internet protocol (“IP”) addresses of users’ computers when they accessed the site. The IP address is the unique number that identifies a computer on the Internet and allows information to be routed properly between computers.

Access to the UC Site, which was taken offline in May 2012, was limited to registered members and required a username and password to gain entry. Various membership requirements were imposed from time to time to restrict site membership to individuals with established knowledge of carding techniques or interest in criminal activity. For example, at times, new users were prevented from joining the site unless they were recommended by two existing users who had registered with the site, or unless they paid a registration fee.

New users registering with the UC Site were required to provide a valid e-mail address as part of the registration process. The e-mail addresses entered by registered members of the site were collected by the FBI.

Harm Prevented By the Undercover Operation

In the course of the undercover operation, the FBI contacted multiple affected institutions and/or individuals to advise them of discovered breaches in order to enable them to take appropriate responsive and protective measures. In so doing, the FBI has prevented estimated potential economic losses of more than $205 million, notified credit card providers of over 411,000 compromised credit and debit cards, and notified 47 companies, government entities, and educational institutions of the breach of their networks.

The Charged Conduct

As alleged in the Complaints unsealed today in the Southern District of New York, the defendants are charged with engaging in a variety of online carding offenses, in which they sought to profit through, among other means, the sale of hacked victim account information, personal identification information, hacking tools, “drop” services and other services that could facilitate carding activity.

MICHAEL HOGUE, a/k/a “xVisceral,” offered malware for sale, including remote access tools (“RATS”) that allowed the user to take over and remotely control the operations of an infected victim-computer. HOGUE’s RAT, for example, enabled the user to turn on the web camera on victims’ computers and spy on them, and to record every keystroke of the victim-computer’s user. If the victim visited a banking website and entered his or her user name and password, the key logging program could record that information, which could then be used to access the victim’s bank account. HOGUE sold his RAT widely over the Internet, usually for $50 per copy and boasted that he had personally infected “50-100” computers with his RAT, and that he’d sold it to others who had infected “thousands” of computers with malware. HOGUE’s RAT infected computers in the United States, Canada, Germany, Denmark, and Poland, and possibly other countries.

JARAND MOEN ROMTVEIT, a/k/a “zer0,” used hacking tools to steal information from the internal databases of a bank, a hotel, and various online retailers, and then sold the information to others. In February 2012, in return for a laptop computer, ROMTVEIT sold credit card information to an individual he believed to be a fellow carder, but who in fact was an undercover FBI agent.

MIR ISLAM, a/k/a “JoshTheGod,” trafficked in stolen credit card information and possessed information for more than 50,000 credit cards. ISLAM also held himself out as a member of “UGNazi,” a hacking group that has claimed credit for numerous recent online hacks, and as a founder of “Carders.Org,” a carding forum on the Internet. Last night, ISLAM met in Manhattan with an individual he believed to be a fellow carder - but who in fact was an undercover FBI agent - to accept delivery of what ISLAM believed were counterfeit credit cards encoded with stolen credit card information. ISLAM was placed under arrest after he attempted to withdraw illicit proceeds from an ATM using one of the cards. Today, the FBI seized the web server for UGNazi.com, and seized the domain name of “Carders.org” – taking both sites offline.

STEVEN HANSEN, a/k/a “theboner1,” and ALEX HATALA, a/k/a, “kool+kake,” sold stolen “CVVs,” a term used by carders to refer to credit card data that includes the name, address, and zip code of the card holder, along with the card number, expiration date, and security code printed on the card. HATALA advertised to fellow carders that he got “fresh” CVV’s on a “daily” basis from hacking into “DBs [databases] around the world.”

ALI HASSAN, a/k/a “Badoo,” also sold “fulls,” a term used by carders to refer to full credit card data including cardholder name, address, social security number, birth date, mother’s maiden name, and bank account information. HASSAN claimed to have obtained at least some of them by having hacked into an online hotel booking site.

JOSHUA HICKS, a/k/a “OxideDox,” and LEE JASON JEUSHENG, a/k/a “iAlert, a/k/a “Jason Kato,” each sold “dumps,” which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards. HICKS sold 15 credit card dumps, in return for a camera and $250 in cash to a fellow carder who, unbeknownst to HICKS, was in fact an undercover FBI agent. HICKS met the undercover agent in downtown Manhattan to consummate the sale. Similarly, JEUSHENG sold 119 credit card dumps, in return for three iPad 2’s to a carder who in fact was an undercover FBI agent. JEUSHENG provided his shipping address in Japan to the undercover agent, which in part led to his identification and arrest.

MARK CAPARELLI, a/k/a “Cubby,” engaged in a so-called “Apple call-in” scheme, in which he used stolen credit cards and social engineering skills to fraudulently obtain replacement products from Apple, Inc., which he then resold for profit. The scheme involved CAPARELLI obtaining serial numbers of Apple products he had not in fact bought. He would then call Apple with the serial number, claim the product was defective, arrange for a replacement product to be sent to an address he designated, and give Apple a stolen credit card number to charge if he failed to return the purportedly defective product. CAPARELLI sold and shipped four iPhone 4 cellphones that he had stolen through the Apple call-in scheme to an individual whom he believed to be a fellow-carder, but who in fact was an undercover FBI agent.

SETH HARPER, a/k/a “Kabraxis314,” and PETER KETCHUM, a/k/a “iwearaMAGNUM,” each sold “drop” services to other carders in return for money or carded merchandise. HARPER provided drop addresses in Albuquerque, New Mexico, to which co-conspirators sent expensive electronics, jewelry, and clothing, among other things. KETCHUM advertised drop locations “spread across multiple cities” in the United States and allegedly received and shipped carded merchandise including sunglasses and air purifiers, as well as synthetic marijuana.

CHRISTIAN CANGEOPOL, a/k/a “404myth,” engaged in illegal “instoring” at Walmart to obtain Apple electronic devices with stolen credit cards. “Instoring” is a term used by carders to refer to using stolen credit card accounts to make in-store, as opposed to online, purchases of items, using stolen credit card information and matching fake identifications. As part of the alleged scheme, CANGEOPOL and a co-conspirator used stolen credit card data to order electronic devices on Walmart’s website; in selecting a delivery option, they opted to have items delivered to various Walmart stores in Georgia; CANGEOPOL then picked up the items using a fake identification; CANGEOPOL and the co-conspirator then resold the carded electronics and split the proceeds.

* * *

The attached chart reflects the name, age, residence, and pending charges against each individual charged in the Southern District of New York.

Mr. Bharara praised the outstanding investigative work of the FBI and its New York Cyber Crime Task Force, which is a federal, state and local law enforcement task force combating cybercrime. Mr. Bharara also commended the U.S. Attorney’s offices in the following districts: New Mexico, Arizona, Delaware, Massachusetts, California (Central and Southern districts), Florida (Middle district), Georgia (Northern), as well as the Manhattan District Attorney’s Office. He also thanked the following domestic law enforcement partners for their assistance: the New York City Police Department; the Essex, Vermont Police Department; the Eaton, Ohio Police Department; the Butler County, Ohio Sheriff’s Office; the Cedar Bluff, Alabama Police Department; the Modesto, California Police Department; the Louisiana State Police; the Suffolk County, New York Police Department; the Bakersfield, California Police Department; the Kern County, California District Attorney’s Office; the Long Beach, California Police Department; the Louisville, Kentucky Metro Police Department; and the Nelson County, Kentucky Sheriff’s Office.

Mr. Bharara acknowledged and thanked the following international law enforcement agencies: the United Kingdom’s Serious Organised Crime Agency, Royal Military Police, Thames Valley Police, Greater Manchester Police, Leicestershire Police, Hertfordshire Police, and Wiltshire Police; the Australian Federal Police; Bosnia’s Republika Srpska Ministry of Interior; the Bulgarian Ministry of Interior, General Directorate for Combating Organized Crime; the Danish National Police; the Royal Canadian Mounted Police; the French National High-Tech Crime Unit (OCLCTIC) of the Central Directorate of the Police Judiciaire; the German Bundeskriminalamt (BKA); the Italian Polizia di Stato, Compartimento Polizia Postale e delle Comunicazioni; the National Police Agency of Japan, Tokyo Metropolitan Police Department (Cyber Crimes Control Division), Ministry of Justice of Japan, Tokyo High Prosecutors Office, and the Ministry of Foreign Affairs of Japan; the Macedonian Ministry of Interior, Department Against Organized Crime; and the Norwegian National Police for their efforts. He also thanked the Computer Crime & Intellectual Property Section of the Department of Justice, as well as the Office of International Affairs at the Department of Justice.

The charges contained in the Complaints are merely accusations and the defendants are presumed innocent unless and until proven guilty.

This case is being handled by the Office’s Complex Frauds Unit. AUSAs James Pastore, Serrin Turner, Timothy Howard, Rosemary Nidiry, Alexander Wilson, and Sarah McCallum, are in charge of the prosecution.

The relevant charging documents can be found on the SDNY website at: http://www.justice.gov/usao/nys/pressreleases/index.html
 

Biggerswipe

BANNED
Messages
51
Reputation
-12
Reaction score
9
Points
8
Please note, if you want to make a deal with this user, that it is blocked.
what did people expect for meeting up for small ass shitty deals like that?
 

WeeBay

Carder
Messages
37
Reputation
4
Reaction score
4
Points
8
This is no big deal. One day for shop owner, everyday for the thief.
 

leenux

RIPPER
Messages
180
Reputation
6
Reaction score
12
Points
18
I always think its their faith to get busted. I mean, I have tried to get access to CarderProfit since it started and couldn't because I couldn't get vouches. But then once my account got vouched but I lost the account password because my email id got hacked. Hahaha, even when I wanted to be on that forum so bad I couldn't get access.

Hmm.
 

Sir. guap

Professional
Messages
153
Reputation
8
Reaction score
13
Points
18
thats was a bullshit deal to meet up for and guys dont know the more low key you move the better and you have to do research or forums nowadays just to post shit cause nowadays flooded with cops and dudes get caught and and rat not knowing the less u say the better u are stop rattin and let them fucking cops work and not do the work for them and move caution these guys move reckless what do u expect back in the days hackers were about being kept private and very exclusive and quite, and nowadays a whole bunch of kids makin shit hot and have no commen sense keep cardind safely and fuck the police !!!!!!!
 

Shimara

DEER
Messages
28
Reputation
0
Reaction score
0
Points
1
"404myth" getting arrested is no surprise the dude is greedy, "iAlert" just a stupid kid who got doxxed by hacker long before he got arrested. Shame about "zer0" getting arrested though he was helpful but too trusting by the looks of it.
 
Last edited:

leenux

RIPPER
Messages
180
Reputation
6
Reaction score
12
Points
18
"404myth" getting arrested is no surprise the dude is greedy, "iAlert" just a stupid kid who got doxxed by hacker long before he got arrested. Shame about "zer0" getting arrested though he was helpful but too trusting by the looks of it.

zer0 - snitch from norway, dig deeper and you'll read it.
 

Ninja

Moderator
Messages
2,350
Reputation
394
Reaction score
450
Points
83
Thats another reason of stop using new boards their purpses is easy - ripoff to get money or getting information to get your ass busted.

btw. i know noone of those mentioned there beside 404myth
 

Rome0

Seller of:,  Dumps
Messages
795
Reputation
79
Reaction score
135
Points
43
Exact same iAlert who was here , 621774508 this is his ICQ from our board

ialert dump seller
E-Mail/MSN: [email protected]*/ [email protected]*/ [email protected]
Website: hxxp://blackmart.xxxx
Info: Thought was genuine forum but run by a fucking wanka kiddie in Japan who does not even know how to write or test dumps correctly.
Stay away from forum, sorry to people who were invited by us.
http://scamers420.blogspot.com/2011/06/list-of-big-time-scamers.html


ICQ: 333277 / 621774508
Site: hxxxp://www.magxxxxxxxxrs.cc
Info: Ripper, shit old DB with fake checker and bad dumps, Kato (below) is admin too, avoid this wanka.
mean he run magic numbers to :)
Tokyo, Japan
Reply »|Report Abuse|Judge it!|#1850Apr 17, 2011
For small orders, Kindly please go to our webshop
shop.blackmart.xxxxxx
For bulk order, ICQ - 621774508
Pricing is ATTRACTIVE.
US 101: Classic =$15| Gold =$20 | Platinum =$20
Sign|Business|Purch $35
For cashier, ICQ - 621774508
Looking for cashiers who have their own equipment. Able to send $ the same day. Most importantly, My work is fresh and good. If you decided to rip me for that 1 time, too bad for you. I'm capable of giving up to 200pcs per day and up to 1k pcs 1 week to work.
But if you decided to rip me, You'll only take it once instead of weeks after weeks. So think carefully.
 
Last edited:

GNR

Carder
Messages
96
Reputation
14
Reaction score
20
Points
8
carders.org aka fraud.su also taken down by fbi today.
fraud.su was from what i understood another version of carderprofit.
 

akinova

RIPPER
Messages
88
Reputation
7
Reaction score
15
Points
8
carders.org aka fraud.su also taken down by fbi today.
fraud.su was from what i understood another version of carderprofit.

No Fraud.su was made by Joshthegod, Zer0 and Mr. Osama aka Hitler and a backstabber (Undercover Officer)

I talked to Zer0 and Josh some days ago and I know all these guys and If i remember correct iAlert was Bs.su staff member.

Anyways the main thing is you should not trust anyone and go to meet them for some deal ;P
 
Top