DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Shadowcrew Vendor Aleksi Kolarov Sentenced To 30 Months In Prison For Role In Largest Identity Theft Ring Of Its Time

Posted on October 23, 2014 by Dissent

A Bulgarian national was sentenced today to 30 months in prison for his participation in the Shadowcrew forum, an online marketplace for hacking and identity theft that was the largest of its kind when dismantled by the Department of Justice and the U.S. Secret Service in 2004, U.S. Attorney Paul J. Fishman announced.

Aleksi Kolarov, 32, previously pleaded guilty before U.S. District Judge William J. Martini to Count One of an indictment charging him with conspiracy to commit both identity theft and access device fraud. Judge Martini imposed the sentence today in Newark federal court.

According to documents filed in this case and statements made in court:

Kolarov evaded capture until June 14, 2011, when Paraguayan law enforcement authorities arrested him at a hotel in Asunción, Paraguay. He was found in possession of hundreds of thousands of dollars in various currencies, counterfeit payment cards and electronic implements to re-encode cards. Prior to his extradition, he had been incarcerated by Paraguayan authorities relating to that conduct. Kolarov was extradited and arrived in the United States on June 28, 2013, escorted by U.S. Marshals.

Shadowcrew.com was an illegal online marketplace that trafficked in at least 1.5 million stolen credit and bank card numbers and caused more than $4 million in losses to the institutions issuing the cards.

Kolarov, along with the other 18 individuals charged in the indictment, participated in the international conspiracy to operate the Shadowcrew site. As part of the organization, Kolarov served as a vendor, using the site to sell illicit merchandise and services to other members. At one time, Shadowcrew.com had approximately 4,000 members dedicated to facilitating malicious computer hacking and the dissemination of stolen credit card, debit card and bank account numbers and counterfeit identification documents, such as drivers’ licenses, passports and Social Security cards. The conspiracy to commit this activity, often referred to as “carding,” facilitated the use of account numbers and counterfeit identity documents to steal identities and defraud banks and retailers. Of the 19 international participants charged in the indictment, three remain at large.

U.S. Attorney Fishman credited the U.S. Secret Service, under the direction of Special Agent in Charge James Mottola, with the investigation leading to the charges. He also thanked the Computer Crime and Intellectual Property Section and Office of International Affairs in the Department of Justice’s Criminal Division and thanked the U.S. Marshals Service for facilitating the extradition. U.S. Attorney Fishman also praised the Paraguayan authorities for their vital role.

The government is represented by Assistant U.S. Attorney Daniel Shapiro of the Computer Hacking and Intellectual Property Section of the Economic Crimes Unit in Newark.

14-384

Defense counsel: Michael Koribanics Esq., Clifton, N.J.

SOURCE: U.S. Attorney’s Office, District of New Jersey

No related posts.

Category: ID TheftOf Note

Post navigation

← The OIG revealed that the FDA’s computer network is vulnerable to a potential data breach
ME: Island Nursing Home successfully sued by former employee →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.