DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Court rejects prosecution’s request for longer sentence, sentences Karim Baratov to 5 years plus a $250,000 fine

Posted on May 29, 2018 by Dissent

SAN FRANCISCO – Karim Baratov, aka Kay, aka Karim Taloverov, aka Karim Akehmet Tokbergenov, 23, was sentenced to 60 months in prison and ordered to pay a $250,000 fine, which encompasses all of his remaining assets.

The sentence was announced by Acting U.S. Attorney Alex G. Tse for the Northern District of California, Assistant Attorney General for National Security John C. Demers, and Special Agent in Charge John F. Bennett of the FBI’s San Francisco Field Office.  The sentence was handed down today by the Honorable Vince Chhabria, U.S. District Judge.

“The sentence imposed reflects the seriousness of hacking for hire,” said Acting U.S. Attorney Tse.  “Hackers such as Baratov ply their trade without regard for the criminal objectives of the people who hire and pay them.  These hackers are not minor players; they are a critical tool used by criminals to obtain and exploit personal information illegally.  In sentencing Baratov to five years in prison, the Court sent a clear message to hackers that participating in cyber attacks sponsored by nation states will result in significant consequences.”

“Criminal hackers and the countries that sponsor them make a grave mistake when they target American companies and citizens.  We will identify them wherever they are and bring them to justice,” said Assistant Attorney General Demers.  “I would like to thank Canadian law enforcement authorities for their tremendous assistance in bringing Baratov to justice.  We will continue to work with our foreign partners to find and prosecute those who would violate our laws.”

“It’s difficult to overstate the unprecedented nature of this conspiracy, in which members of a foreign intelligence service directed and empowered criminal hackers to conduct a massive cyber-attack against 500 million victim user accounts,” said Special Agent in Charge John F. Bennett.  “Today’s sentencing demonstrates the FBI’s unwavering commitment to disrupt and prosecute malicious cyber actors despite their attempts to conceal their identities and hide from justice.”

Baratov, a Canadian national and resident, and three other defendants, including two officers of the Russian Federal Security Service (FSB), Russia’s domestic law enforcement and intelligence service, were charged with a number of offenses relating to the hacking of webmail accounts at Yahoo and other service providers.  In particular, the defendants were charged in a computer hacking conspiracy in which the two Russian FSB officers hired criminal hackers to collect information through computer intrusions in the United States and abroad, which resulted in the unauthorized access of Yahoo’s network and the spear phishing of webmail accounts at other service providers between January 2014 and December 2016.

Baratov’s role in the charged conspiracy was to hack webmail accounts of individuals of interest to his coconspirator who was working for the FSB and send those accounts’ passwords to Dokuchaev in exchange for money.  The Indictment and additional documents setting out the allegations are available at www.usdoj.gov/usao/can.

Baratov has been detained since his arrest in Canada in March 2017.  Baratov waived extradition to the United States and was transferred to the Northern District of California in August 2017.  In November 2017, Baratov pleaded guilty to Count One and Counts Forty through Forty-Seven of the Indictment.  Count One charged Baratov, Dokuchaev, Sushchin, and Belan with conspiring to violate the Computer Fraud and Abuse Act by stealing information from protected computers and causing damage to protected computers.  Counts Forty through Forty-Seven charged Baratov and Dokuchaev with aggravated identity theft.  As part of his plea agreement, Baratov not only admitted to agreeing and attempting to hack at least 80 webmail accounts on behalf of one of his FSB co-conspirators, but also to hacking more than 11,000 webmail accounts in total from in or around 2010 until his March 2017 arrest by Canadian authorities.  In addition to any prison sentence, Baratov agreed to pay restitution to his victims, and to pay a fine up to $2,250,000, at $250,000 per count, with any assets he has remaining after satisfying a restitution award.           

The FBI, led by the San Francisco Field Office, conducted the investigation that resulted in the charges in the Indictment.  The case is being prosecuted by the U.S. Attorney’s Office for the Northern District of California and the U.S. Department of Justice National Security Division’s Counterintelligence and Export Control Section, with support from the Justice Department’s Office of International Affairs.

Further Information:

Case #: 3:17-CR-103 VC

A copy of this press release will be placed on the U.S. Attorney’s Office’s website at www.usdoj.gov/usao/can.


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • France Travail: At least 340,000 job seekers victims of new hack
  • Suspected XSS Forum Admin Arrested in Ukraine
Category: Business SectorHackOf NoteU.S.

Post navigation

← Privacy Commissioner says Avenue Living privacy breach poses a risk
Purdue warns patients that their information might be compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.