DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian National Pleads Guilty to Conspiracy to Introduce Malware into a U.S. Company’s Computer Network

Posted on March 19, 2021 by Dissent

More big news out of DOJ yesterday: an update on a previously reported case involving Tesla:

A Russian national pleaded guilty in federal court today for conspiring to travel to the United States to recruit an employee of a Nevada company into a scheme to introduce malicious software into the company’s computer network.

According to court documents and admissions made in court, from July 15, 2020, to Aug. 22, 2020, Egor Igorevich Kriuchkov, 27, conspired with others to recruit an employee of a large U.S. company to transmit malware provided by the conspirators into the company’s computer network. Once the malware was installed, Kriuchkov and his co-conspirators would use it to exfiltrate data from the company’s computer network and then extort the company by threatening to disclose the data.

As part of the conspiracy, Kriuchkov traveled from Russia to California through New York.  On numerous occasions between Aug. 1, 2020, and Aug. 21, 2020, Kriuchkov traveled from California to Nevada in an attempt to entice the employee to participate in this hacking scheme, offering to pay the employee with Bitcoin if the employee transmitted the malware.  After meeting with Kriuchkov, the employee reported his conduct to the victim company, which promptly contacted the FBI. The FBI then thwarted the scheme.

“The swift response of the company and the FBI prevented a major exfiltration of the victim company’s data and stopped the extortion scheme at its inception,” said Acting Assistant Attorney General Nicholas L. McQuaid of the Justice Department’s Criminal Division. “This case highlights the importance of companies coming forward to law enforcement, and the positive results when they do so.”

“This case highlights our office’s commitment to protecting trade secrets and other confidential information belonging to U.S. businesses — which is becoming even more important each day as Nevada evolves into a center for technological innovation,” said Acting U.S. Attorney Christopher Chiou for the District of Nevada. “Along with our law enforcement partners, we will continue to prioritize stopping cybercriminals from harming American companies and consumers.”

“This is an excellent example of community outreach resulting in strong partnerships, which led to proactive law enforcement action before any damage could occur,” said Special Agent in Charge Aaron C. Rouse of the FBI’s Las Vegas Field Office.

Kriuchkov pleaded guilty to one count of conspiracy to intentionally cause damage to a protected computer and is scheduled to be sentenced May 10.

The investigation was led by the FBI Las Vegas Field Office with the assistance of the FBI Los Angeles Field Office, the FBI Sacramento Field Office, and the Washoe County Sheriff’s Office in Nevada.

The case is being prosecuted by Senior Counsel C.S. Heath and Trial Attorney Thomas Dettore of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Richard Casper of the District of Nevada.

Source: Department of Justice, Office of Public Affairs

No related posts.

Category: Breach Incidents

Post navigation

← NZ: Lumino dental firm email hack: Patient information accessed
REvil ransomware has a new ‘Windows Safe Mode’ encryption mode →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.