DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian-Born Cybercriminal Sentenced to Over Nine Years in Prison

Posted on July 11, 2017 by Dissent

A nearly decade-long member of several elite Russian-speaking cybercrime forums was sentenced yesterday to 110 months in prison for running a sophisticated scheme to steal and traffic sensitive personal and financial information in the online criminal underground.

Alexander Tverdokhlebov, 29, of Los Angeles, pleaded guilty on March 31 to wire fraud. Accordingly to court documents, the defendant, who emigrated from Russia in 2007 and subsequently obtained U.S. citizenship, was an active member of several highly exclusive Russian-speaking cybercrime forums since at least 2008. Through his membership on these forums, Tverdokhlebov forged lucrative business partnerships with other Russian-speaking cybercriminals, with whom he exchanged tools, services, and stolen personal and financial information.

The defendant offered a variety of illegal services on these forums, including the laundering of stolen funds. He also operated several “botnets,” which are groups of compromised computers that can be used to steal credit card and other sensitive financial information. At various times between 2009 and 2013, Tverdokhlebov claimed on the cybercrime forums that, among other things, he possessed 40,000 stolen credit card numbers and could control up to 500,000 infected computers.

Tverdokhlebov executed a number of schemes to “cash out” or monetize the financial information he stole, such as by selling it to other cybercriminals or by providing it to accomplices who would use it to make fraudulent purchases or fraudulent withdrawals from victims’ accounts. In addition, the defendant recruited Russian students visiting the United States on J-1 visas to open bank accounts in their names, receive money from victim accounts, and then transfer the money to Tverdokhlebov or his co-conspirators.

The plea agreement stipulates to estimated losses between $9.5 and $25 million. Upon Tverdokhlebov’s arrest, the government seized $272,000 in hundred dollar bills distributed among several safe deposit boxes in Los Angeles and Las Vegas. The government was able to seize additional assets from the defendant, including Bitcoin, currently valued at approximately $5 million.

As part of the sentencing, the court also ordered the defendant to serve three years of supervised release following his prison term, with conditions of release that will include monitoring of the defendant’s computer use.

Dana J. Boente, U.S. Attorney for the Eastern District of Virginia; and Brian J. Ebert, Special Agent in Charge of the U.S. Secret Service’s Washington Field Office, made the announcement after sentencing by U.S. District Judge T.S. Ellis III. Assistant U.S. Attorneys Kellen S. Dwyer and Laura Fong prosecuted the case.

The New York County District Attorney’s Office, along with the U.S. Secret Service’s Los Angeles Field Office, provided significant assistance with the investigation.

SOURCE: U.S. Attorney’s Office, Eastern District of Virginia

Category: Financial SectorMalwareOf Note

Post navigation

← Foreign hackers probe European critical infrastructure networks: sources
Israeli startup tracks behavior to outsmart hacker bots →

1 thought on “Russian-Born Cybercriminal Sentenced to Over Nine Years in Prison”

  1. Mac says:
    July 12, 2017 at 9:51 am

    Any emmigrant who commits Felonies or gross misdomeniors should have their
    Visa or even citizenship revoked.
    The West,including Europe,needs to clean house and expunge these scum out of our culture.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.