4 Hackers Indicted in $9.5 Million Bank Card Attack

VasiliyPupkin

Carder
Messages
40
Reputation
3
Reaction score
3
Points
8
Four men have been indicted in Georgia on charges that they hacked into the Atlanta-based bank card processing company RBS WorldPay. They allegedly used an army of flunkies to steal $9.5 million in cash from ATM machines around the world in a span of hours.

Sergei Tsurikov, 25, of Tallinn, Estonia; Viktor Pleshchuk, 28, of St. Petersburg, Russia; Oleg Covelin, 28, of Chisinau, Moldova; and a fourth person identified only as “Hacker 3″ were indicted by a federal grand jury in what’s being described as “perhaps the most sophisticated and organized computer fraud attack ever conducted.”

The hack involved reverse-engineering PINs for payroll debit card accounts — the holy grail of bank card hacking. Another four people based in Estonia were also indicted on access-device fraud charges in connection with the hack.

The case is being prosecuted by the U.S. Attorney’s office for the Northern District of Georgia, in Atlanta.

RBS WorldPay, the payment-processing arm of the Royal Bank of Scotland, provides a multitude of electronic payment processing services, including debit card transactions, electronic benefits transfer payments (EBT), gift cards, customer-loyalty cards, prepaid cards, credit card and ATM-processing services. The processor discovered last November 10 that it had been hacked and that the intruders had accessed account details for 100 payroll cards. The hackers also obtained Social Security numbers of about 1.1 million account holders.

Initial reports painted the intrusion as a limited hack, due to the number of cards compromised. But the 16-count indictment (.pdf) charges that the four hackers “compromised the data encryption” that RBS WorldPay used on payroll debit cards to raise the amount of funds available on the cards, as well as withdrawal limits. Payroll debit cards are used by employers to pay employees instead of checks. In some cases the hackers raised the limits to $500,000.

According to the indictment, Tsurikov conducted reconnaissance of the RBS network after Covelin provided him with information about vulnerabilities in the system. Pleshchuk and Covelin then worked on exploiting the vulnerabilities to obtain access on November 4. Pleschuk allegedly developed the method for reverse-engineering the encrypted PINs.

Once the hackers raised the account limits, they provided an army of cashers with 44 cards embedded with the account details for a coordinated, simultaneous attack on ATMs around the world. On November 8, the cashers were instructed to begin siphoning money, and they hit more than 2,000 ATMs in less than 12 hours, netting about $9.5 million. Three Estonian defendants charged for their role in cashing — Ronald Tso, Evelin Tsoi and Mihhail Jevgenov — allegedly were responsible for withdrawing about $289,000 from ATMs in Tallinn, Estonia.

The cashers kept 30 to 50 percent of the loot before transmitting the remainder back to the hackers in Eastern Europe through Western Union and Web Money, a Russia-based digital currency service. The hackers, still in RBS’s network, were able to observe the withdrawals of funds from ATMs as they occurred in real time in order to monitor the amounts being taken by cashers and lock the accounts to prevent further withdrawals.


Once the mission was completed, the hackers tried to erase their tracks on the RBS network.

Tsurikov was arrested earlier this year in Estonia and is being held there pending extradition to the United States. The Justice Department will not comment at this time on the status of Pleshchuk and Covelin, a spokesman told Threat Level.

Tsurikov, Pleshchuk, Covelin and “Hacker 3″ face a maximum sentence of up to 20 years in prison for conspiracy to commit wire fraud and other wire-fraud counts, and up to five years in prison for conspiracy to commit computer fraud as well as up to five or 10 years for each count of computer fraud. They also face a two-year mandatory minimum sentence for aggravated identity theft and fines up to $3.5 million dollars.

Covelin was also indicted in September in New York as part of a gang that authorities dubbed the Western Express Cybercrime Group. That group, operating between 2001 and 2007, trafficked in at least 95,000 known stolen credit card numbers.

The group worked with a New York-based company called Western Express International, which authorities allege was used to coordinate and facilitate the illegal activities and launder the ring’s ill-gotten gains.
 

Panther

Professional
Messages
334
Reputation
49
Reaction score
61
Points
28
Source of this article? Year of this Article?
 

TheBanker

BANNED
Messages
3
Reputation
0
Reaction score
0
Points
1
wtf 2 days of cash... and busted! are these people stupid or what? I know it is weird to say because they are obviously clever hackers but these guys seriously have no general common sense about the crimes they are commiting.

1. They try to fuck with RBN's network they will be hacked, tracked and killed :D
2. $9.5m in 1 hit... are they drunk or crazy? I think both :)

It's sad to see another waste of some damn fine talent though!
 
Last edited:

Gorod

BANNED
Messages
54
Reputation
2
Reaction score
8
Points
8
1. They try to fuck with RBN's network they will be hacked, tracked and killed :D



if they where skilled to hack it in the first place not being tracked should be the easy part

these great hackers like analyzer get to cocky with there abilites and dont care about security
 
Last edited:

barzilla187

BANNED
Messages
5
Reputation
1
Reaction score
3
Points
3
I remember this when it was reported ,they nabbed some of the cashers in atlanta scared the bejeebus out of them and they crumbled from the bottom up.I said this before and ill say it again,I know all the wrong people.About 13 years ago there was a paper written on how to rob a bank electronically and I swear it is the blueprint for this particular caper.Gorod is right these flower heads should have never been caught
 

VIPDealer1

BANNED
Messages
6
Reputation
0
Reaction score
0
Points
1
It's very difficult for me to understand what happened, what went wrong here.

It looks like they got busted 1 year after the job, so I would say they followed the paper/money trail back to them. I'm not saying IT forensics was useless, but I'm pretty sure it didn't play a major role here.

Even assuming a low-level cashier got busted (or was a snitch), what sort of leads could he have provided, that could ultimately have lead them to their door?

Any opinions on what went wrong? How on earth they got busted?
 

xylon

BANNED
Messages
26
Reputation
1
Reaction score
1
Points
3
Please note, if you want to make a deal with this user, that it is blocked.
If any is reading if you have this working I can have it back to in a few days and it will not be sloppy. As I said before I had great sucess with this from the old days. Lets work.
 

efxforlife

Member
Messages
6
Reputation
0
Reaction score
0
Points
1
yea this was crazy i heard about it and they must have fell asleep counting this money after the operations :) sexyblack
 

Templar

RIPPER
Messages
20
Reputation
-1
Reaction score
1
Points
3
Western Union and WMZ?

JESUS!

Apparently, these folks don't know shit about laundering money.

PUSSIES!

simple d+p would have saved their asses, now they gon' face LIFE in the penn!

what a waste!

---------- Сообщение добавлено в 12:25 AM ---------- Предыдущее сообщение размещено в 12:24 AM ----------

Western Union and WMZ?

JESUS!

Apparently, these folks don't know shit about laundering money.

PUSSIES!

simple d+p would have saved their asses, now they gon' face LIFE in the penn!

what a waste!
 

xylon

BANNED
Messages
26
Reputation
1
Reaction score
1
Points
3
Please note, if you want to make a deal with this user, that it is blocked.
WOW.............. I still can not believe this and what a shame...I hope they do not come to the US it sucks...in prison....Fuck the Police......
 
Top