DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Shadowcrew Vendor Aleksi Kolarov Sentenced To 30 Months In Prison For Role In Largest Identity Theft Ring Of Its Time

Posted on October 23, 2014 by Dissent

A Bulgarian national was sentenced today to 30 months in prison for his participation in the Shadowcrew forum, an online marketplace for hacking and identity theft that was the largest of its kind when dismantled by the Department of Justice and the U.S. Secret Service in 2004, U.S. Attorney Paul J. Fishman announced.

Aleksi Kolarov, 32, previously pleaded guilty before U.S. District Judge William J. Martini to Count One of an indictment charging him with conspiracy to commit both identity theft and access device fraud. Judge Martini imposed the sentence today in Newark federal court.

According to documents filed in this case and statements made in court:

Kolarov evaded capture until June 14, 2011, when Paraguayan law enforcement authorities arrested him at a hotel in Asunción, Paraguay. He was found in possession of hundreds of thousands of dollars in various currencies, counterfeit payment cards and electronic implements to re-encode cards. Prior to his extradition, he had been incarcerated by Paraguayan authorities relating to that conduct. Kolarov was extradited and arrived in the United States on June 28, 2013, escorted by U.S. Marshals.

Shadowcrew.com was an illegal online marketplace that trafficked in at least 1.5 million stolen credit and bank card numbers and caused more than $4 million in losses to the institutions issuing the cards.

Kolarov, along with the other 18 individuals charged in the indictment, participated in the international conspiracy to operate the Shadowcrew site. As part of the organization, Kolarov served as a vendor, using the site to sell illicit merchandise and services to other members. At one time, Shadowcrew.com had approximately 4,000 members dedicated to facilitating malicious computer hacking and the dissemination of stolen credit card, debit card and bank account numbers and counterfeit identification documents, such as drivers’ licenses, passports and Social Security cards. The conspiracy to commit this activity, often referred to as “carding,” facilitated the use of account numbers and counterfeit identity documents to steal identities and defraud banks and retailers. Of the 19 international participants charged in the indictment, three remain at large.

U.S. Attorney Fishman credited the U.S. Secret Service, under the direction of Special Agent in Charge James Mottola, with the investigation leading to the charges. He also thanked the Computer Crime and Intellectual Property Section and Office of International Affairs in the Department of Justice’s Criminal Division and thanked the U.S. Marshals Service for facilitating the extradition. U.S. Attorney Fishman also praised the Paraguayan authorities for their vital role.

The government is represented by Assistant U.S. Attorney Daniel Shapiro of the Computer Hacking and Intellectual Property Section of the Economic Crimes Unit in Newark.

14-384

Defense counsel: Michael Koribanics Esq., Clifton, N.J.

SOURCE: U.S. Attorney’s Office, District of New Jersey

Category: ID TheftOf Note

Post navigation

← The OIG revealed that the FDA’s computer network is vulnerable to a potential data breach
ME: Island Nursing Home successfully sued by former employee →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach
  • Oklahoma Expands its Security Breach Notification Law
  • Ransomware group Gunra claims to have exfiltrated 450 million patient records from American Hospital Dubai.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.