DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tyler Nashatka a/k/a “Psycho” arraigned on hacking, conspiracy to commit fraud, and aggravated identity theft; allegedly conspired with “Glubz”

Posted on October 11, 2019 by Dissent

Alleged hacker Anthony Tyler Nashatka, a/k/a “psycho,” appeared today in federal court on charges of conspiracy to commit computer fraud and abuse, conspiracy to commit wire fraud, aggravated identity theft and other charges related to a scheme to defraud victims of at least $1.4 million in cryptocurrency in December of 2017, announced United States Attorney David L. Anderson and U.S. Secret Service Special Agent in Charge Thomas Edwards. Nashatka was arraigned before U.S. Magistrate Judge Jacqueline Scott Corley and was released on bond pending further proceedings.

A federal grand jury indicted Nashatka, a current resident of Michigan, along with his co-conspirator, United Kingdom resident Elliott Gunton, a/k/a “planet,” a/k/a “Glubz,” on August 13, 2019. According to the indictment, in December of 2017, Nashatka conspired to target a cryptocurrency exchange platform to obtain the private keys and other information of hundreds of its users as part of a scheme to steal the users’ cryptocurrency. The indictment further describes how the defendants unlawfully used the identity of a victim to gain access to the platform’s domain name settings, caused the transmission of a command to disable all of the cryptocurrency company’s servers, diverted users from the actual platform to a fake website, and fraudulently induced victims to input their cryptocurrency addresses and private keys into the fake website. The indictment alleges between December 20 and 21, 2017, Nashatka and his co-conspirators logged the credentials of hundreds of victims, stole their cryptocurrency, and transferred approximately $600,000 in cryptocurrency to one cryptocurrency address controlled by Nashatka and his co-conspirators. In addition, using this fraud scheme, Nashatka and his co-conspirators stole and additional $800,000 from a single victim on December 26, 2017. The investigation to identify additional victims is continuing.

In sum, each defendant was charged with one count each of the following crimes: conspiracy to commit computer fraud and abuse, in violation of 18 U.S.C. § 1030(b); transmission of a program, information, code, and command to cause damage to a protected computer, in violation of 18 U.S.C. §§ 1030(a)(5)(A), (c)(4)(B)(i) and (c)(4)(A)(i)(VI); unauthorized access to a protected computer to obtain value, in violation of 18 U.S.C. §§ 1030(a)(4)
and (c)(3)(A); conspiracy to commit wire fraud, in violation of 18 U.S.C. § 1349; and aggravated identity theft, in violation of 18 U.S.C. § 1028A(a)(1).

Nashatka was arrested in New York on September 6, 2019. His next court appearance is scheduled for November 13, 2019, before the Honorable Edward M. Chen, U.S. District Judge for a status conference.

An indictment merely alleges that crimes have been committed, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt. If convicted, the defendant faces the following maximum statutory sentences:

Further Information: Case #: 3:19-cr-00372-EMC

Source: U. S. Attorney’s Office, Northern District of California

Related posts:

  • Three North Korean Military Hackers Involved in Sony Pictures Hack, Wanna Cry, and Numerous Other Attacks Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
  • U.K. Citizen Extradited and Pleads Guilty to Cyber Crime Offenses
Category: Hack

Post navigation

← Escort forums in Italy and the Netherlands hacked by “InstaKilla,” user data put up for sale
JustDial fixes bug that allowed hackers access →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.