DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Daniel Kaye, an operator behind The Real Deal market, arraigned on federal charges

Posted on October 26, 2022 by Dissent

ATLANTA – Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s charges arise from his alleged operation of The Real Deal, a Dark Web market that sold, among other things, hacking tools and stolen login credentials, and his laundering of funds he received from that market.

“While living overseas, this defendant allegedly operated an illegal website that made hacking tools and login credentials available for purchase, including those for U.S. government agencies,” said U.S. Attorney Ryan K. Buchanan. “This case is a timely reminder, during National Cybersecurity Awareness Month, that federal law enforcement will make those accused of breaking U.S. laws face their day in court, regardless of where they reside in the world.”

“This case is an example of our persistent determination to work with our international partners to hold criminals accountable no matter how sophisticated their cyber fraud or their geographic location,” said Keri Farley, Special Agent in Charge of FBI Atlanta.  “Let this indictment be a message that the FBI and our partners place a high priority on the investigation and prosecution of hackers who intrude into our infrastructure and threaten the personal security of our citizens.”

According to U.S. Attorney Buchanan, the charges, and other information presented in court: Kaye allegedly operated The Real Deal, a Dark Web market for illicit items, including stolen account login credentials for U.S. government computers; stolen account login credentials for social media accounts and bank accounts; stolen credit card information; stolen personally identifiable information; illegal drugs; botnets; and computer hacking tools. The market was organized into categories, such as “Exploit Code,” “Counterfeits,” “Drugs,” “Fraud & More, “Government Data,” and “Weapons.” The market allowed vendors to create accounts and list their products. These vendors maintained profile pages offering a rating system where buyers could rank vendors.

The indictment alleges that Kaye listed for sale on The Real Deal login credentials for U.S. government computers belonging to the U.S. Postal Service, the National Oceanic and Atmospheric Administration, the Centers for Disease Control and Prevention, the National Aeronautics and Space Administration, and the U.S. Navy. The indictment further alleges that Kaye, along with an individual (or individuals) known as “thedarkoverlord,” trafficked in stolen social security numbers; and that Kaye possessed 15 or more stolen login credentials for Twitter and LinkedIn. Finally, the indictment alleges that Kaye laundered cryptocurrency he obtained from The Real Deal through Bitmixer.io, a website that offered Bitcoin “mixing” services and, through its “mixing” algorithm, sought to keep its users anonymous, private, and immune to Bitcoin blockchain tracing analysis.

On April 13, 2021, a federal grand jury returned an indictment charging Kaye with five counts of access device fraud for unauthorized solicitation, in violation of 18 U.S.C. § 1029(a)(6), one count of using and trafficking in unauthorized access devices, in violation of 18 U.S.C. § 1029(a)(2), two counts of possession of unauthorized and counterfeit access devices, in violation of 18 U.S.C. § 1029(a)(3), and one count of money laundering conspiracy, in violation of 18 U.S.C. § 1956(h). Kaye was overseas at the time the indictment was filed and, in September 2022, consented to his extradition from Cyprus to the United States.

Daniel Kaye, also known as “Popopret,” “Bestbuy,” “TheRealDeal,” “Logger,” “David Cohen,” “Marc Chapon,” “UserL0ser,” “Spdrman,” “Dlinch Kravitz,” “Fora Ward,” and “Ibrahim Sahil,” 34, of London, England, was arraigned before U.S. Magistrate Judge Linda T. Walker.  Members of the public are reminded that the indictment only contains charges.  The defendant is presumed innocent of the charges and it will be the government’s burden to prove the defendant’s guilt beyond a reasonable doubt at trial.

This case is being investigated by the Federal Bureau of Investigation. Also the Department of Justice’s Office of International Affairs, Cyprus Ministry of Justice and Public Order, Cyprus Police, German Bundeskriminalamt, and United Kingdom National Crime Agency, assisted in this investigation.

Assistant U.S. Attorney Samir Kaushal is prosecuting the case.

October is recognized as National Cybersecurity Awareness Month. Unfortunately, criminals continue to victimize people online by exploiting their personal security, financial safety, and identity. To help victim service providers and allied professionals better serve victims of cybercrime and keep them safer online, the Office for Victims of Crime Training & Technical Assistance Center offers many resources to update the field about cybersecurity and the tools available to serve victims. Please visit their website to learn more: https://www.ovcttac.gov/.

For further information please contact the U.S. Attorney’s Public Affairs Office at [email protected] or (404) 581-6016.  The Internet address for the U.S. Attorney’s Office for the Northern District of Georgia is http://www.justice.gov/usao-ndga.

Source: U.S. Attorney’s Office, Northern District of Georgia

Related:  Indictment

Related posts:

  • Surprise: Daniel Kaye, operator of The Real Deal, pleads guilty to one count, is sentenced to time served, and is released.
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
  • Greece arrests Russian suspected of running $4 billion bitcoin laundering ring; BTC-e goes unexpectedly offline
Category: Government SectorHackID TheftOf Note

Post navigation

← “Every Rhode Islander Should be Concerned,” Says ACLU’s Brown on RIPTA Data Breach Lawsuit
Davenport Community Schools’ “server issues” were Karakurt issues →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.