DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Court rejects prosecution’s request for longer sentence, sentences Karim Baratov to 5 years plus a $250,000 fine

Posted on May 29, 2018 by Dissent

SAN FRANCISCO – Karim Baratov, aka Kay, aka Karim Taloverov, aka Karim Akehmet Tokbergenov, 23, was sentenced to 60 months in prison and ordered to pay a $250,000 fine, which encompasses all of his remaining assets.

The sentence was announced by Acting U.S. Attorney Alex G. Tse for the Northern District of California, Assistant Attorney General for National Security John C. Demers, and Special Agent in Charge John F. Bennett of the FBI’s San Francisco Field Office.  The sentence was handed down today by the Honorable Vince Chhabria, U.S. District Judge.

“The sentence imposed reflects the seriousness of hacking for hire,” said Acting U.S. Attorney Tse.  “Hackers such as Baratov ply their trade without regard for the criminal objectives of the people who hire and pay them.  These hackers are not minor players; they are a critical tool used by criminals to obtain and exploit personal information illegally.  In sentencing Baratov to five years in prison, the Court sent a clear message to hackers that participating in cyber attacks sponsored by nation states will result in significant consequences.”

“Criminal hackers and the countries that sponsor them make a grave mistake when they target American companies and citizens.  We will identify them wherever they are and bring them to justice,” said Assistant Attorney General Demers.  “I would like to thank Canadian law enforcement authorities for their tremendous assistance in bringing Baratov to justice.  We will continue to work with our foreign partners to find and prosecute those who would violate our laws.”

“It’s difficult to overstate the unprecedented nature of this conspiracy, in which members of a foreign intelligence service directed and empowered criminal hackers to conduct a massive cyber-attack against 500 million victim user accounts,” said Special Agent in Charge John F. Bennett.  “Today’s sentencing demonstrates the FBI’s unwavering commitment to disrupt and prosecute malicious cyber actors despite their attempts to conceal their identities and hide from justice.”

Baratov, a Canadian national and resident, and three other defendants, including two officers of the Russian Federal Security Service (FSB), Russia’s domestic law enforcement and intelligence service, were charged with a number of offenses relating to the hacking of webmail accounts at Yahoo and other service providers.  In particular, the defendants were charged in a computer hacking conspiracy in which the two Russian FSB officers hired criminal hackers to collect information through computer intrusions in the United States and abroad, which resulted in the unauthorized access of Yahoo’s network and the spear phishing of webmail accounts at other service providers between January 2014 and December 2016.

Baratov’s role in the charged conspiracy was to hack webmail accounts of individuals of interest to his coconspirator who was working for the FSB and send those accounts’ passwords to Dokuchaev in exchange for money.  The Indictment and additional documents setting out the allegations are available at www.usdoj.gov/usao/can.

Baratov has been detained since his arrest in Canada in March 2017.  Baratov waived extradition to the United States and was transferred to the Northern District of California in August 2017.  In November 2017, Baratov pleaded guilty to Count One and Counts Forty through Forty-Seven of the Indictment.  Count One charged Baratov, Dokuchaev, Sushchin, and Belan with conspiring to violate the Computer Fraud and Abuse Act by stealing information from protected computers and causing damage to protected computers.  Counts Forty through Forty-Seven charged Baratov and Dokuchaev with aggravated identity theft.  As part of his plea agreement, Baratov not only admitted to agreeing and attempting to hack at least 80 webmail accounts on behalf of one of his FSB co-conspirators, but also to hacking more than 11,000 webmail accounts in total from in or around 2010 until his March 2017 arrest by Canadian authorities.  In addition to any prison sentence, Baratov agreed to pay restitution to his victims, and to pay a fine up to $2,250,000, at $250,000 per count, with any assets he has remaining after satisfying a restitution award.           

The FBI, led by the San Francisco Field Office, conducted the investigation that resulted in the charges in the Indictment.  The case is being prosecuted by the U.S. Attorney’s Office for the Northern District of California and the U.S. Department of Justice National Security Division’s Counterintelligence and Export Control Section, with support from the Justice Department’s Office of International Affairs.

Further Information:

Case #: 3:17-CR-103 VC

A copy of this press release will be placed on the U.S. Attorney’s Office’s website at www.usdoj.gov/usao/can.


Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
Category: Business SectorHackOf NoteU.S.

Post navigation

← Privacy Commissioner says Avenue Living privacy breach poses a risk
Purdue warns patients that their information might be compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.