DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Citizen of Kazakhstan known as “fxmsp” charged with computer fraud, wire fraud, and conspiracy for hacking hundreds of corporate networks in more than 40 countries worldwide

Posted on July 7, 2020 by Dissent

Wow. There will be a lot of media coverage about this one, but let’s start with the DOJ’s press announcement and indictment:

Prolific hacker sold network access to other cybercriminals on various underground forums, enabling various further cyberattacks

Seattle – An indictment was unsealed today in the Western District of Washington charging a citizen of Kazakhstan, ANDREY TURCHIN, a/k/a “fxmsp,” 37, with various federal crimes related to a prolific, financially motivated cybercrime group that hacked the computer networks of a broad array of corporate entities, educational institutions, and governments throughout the world, announced U.S. Attorney Brian T. Moran.  The “fxmsp” group established persistent access, or “backdoors,” to victim networks, which they then advertised and sold to other cybercriminals subjecting victims to a variety of cyberattacks and fraud.

“Cybercrime knows no international borders, and stopping these crimes requires cooperation between an array of international partners.  I commend Kazakhstan for its assistance in this investigation,” said U.S. Attorney Brian T. Moran.  “I am hopeful these critical international partnerships between cybercrime investigators will lead to holding Andrey Turchin accountable in a court of law.”

“Sophisticated cybercrimes can be extremely difficult to investigate.  However, by working closely with our international law enforcement partners at the UK’s National Crime Agency, along with victims, private sector security researchers and great cooperation from our international law enforcement partners in Kazakhstan, the FBI was able to disrupt Mr. Turchin and his alleged co-conspirator’s criminal intrusions,” said Raymond Duda, Special Agent in Charge FBI Seattle Field Office.  “This case demonstrates the FBI’s commitment to uncover and counter cyber criminals, domestic or abroad.”

According to the five-count indictment and records on file, from at least October 2017 through the date charges were returned by a Grand Jury, in December 2018, TURCHIN and his accomplices perpetrated an ambitious hacking enterprise broadly targeting hundreds of victims across six continents, including more than 30 in the United States.  Widely known in hacking circles by the moniker “fxmsp,” TURCHIN employed a collection of hacking techniques and malicious software (malware) to gain and maintain access to victim networks.  For instance, he often used specially designed code to scan the Internet for open Remote Desktop Protocol (RDP) ports and conduct brute-force attacks to initially compromise victim networks.  Once inside the victim’s system, he moved laterally throughout the network and deployed additional malicious code to locate and steal administrative credentials and establish persistent access.  The conspirators often modified antivirus software settings to allow malware to continue to run undetected.

TURCHIN and his co-conspirators then marketed and sold the network access on various underground forums commonly frequented by hackers and cybercriminals, such as Exploit.in, fuckav.ru, Club2Card, Altenen, Blackhacker, Omerta, Sniff3r, and L33t, among others.  Prices typically ranged from a couple thousand dollars to, in some cases, over a hundred thousand dollars, depending on the victim and the degree of system access and controls.  Many transactions occurred through use of a broker and escrow, which allowed interested buyers to sample the network access for a limited period to test the quality and reliability of the illicit access.  As has been publicly reported, the “fxmsp” group has been linked to numerous high-profile data breaches, ransomware attacks, and other cyber intrusions.

TURCHIN is charged with conspiracy to commit computer hacking, two counts of computer fraud and abuse (hacking), conspiracy to commit wire fraud, and access device fraud.  Conspiracy to commit computer fraud is punishable by up to five years in prison.  The two counts of computer fraud and abuse (hacking) are punishable by up to ten and five years in prison, respectively.  Conspiracy to commit wire fraud is punishable by up to 20 years in prison.  Access device fraud is punishable by up to ten years in prison.

The charges contained in the indictment are only allegations.  A person is presumed innocent unless and until he or she is proven guilty beyond a reasonable doubt in a court of law.

The case is being investigated by the FBI Seattle Office, Cyber Crime Task Force, with the cooperation of the United Kingdom’s National Crime Agency (NCA), and with assistance from the U.S. Department of Justice’s Criminal Division’s Office of International Affairs, the FBI Legal Attaché Offices in London and Nur-sultan, and the National Security Committee of the Republic of Kazakhstan (KNB).

The case is being prosecuted by Assistant United States Attorney Steven Masada.

turchin_indictment.pdf

You can find some previous coverage of fxmsp  here and here.

Related posts:

  • IRS’s Top 10 Identity Theft Prosecutions
  • Member of Sophisticated China-Based Hacking Group Indicted for Series of Computer Intrusions, Including 2015 Data Breach of Health Insurer Anthem Inc. Affecting Over 78 Million People
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
  • Leader of International Malvertising and Ransomware Schemes Extradited from Poland to Face Cybercrime Charges
Category: Of Note

Post navigation

← Providence Health Plan notifies members after documents exposed by business associate coding error
Complaint Against Delhi University VC Alleges Data Privacy Breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.