DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Skynet Market founder pleads guilty to conspiracy to sell stolen financial info on the dark web

Posted on May 16, 2023 by Dissent

An Illinois man pleaded guilty yesterday to leading a conspiracy to sell stolen financial information on the dark web, aka darknet.

According to court documents, Michael D. Mihalo, aka Dale Michael Mihalo Jr., 40, of Naperville, was the founder of a darknet “carding” site called Skynet Market, which was used to sell stolen financial information on the internet. Operating under the moniker ggmccloud1, Mihalo and his co-conspirators were also prominent vendors on additional darknet markets, including AlphaBay Market, Wall Street Market, and Hansa Market. Each market required users to conduct transactions in digital currencies, including Bitcoin. Through these markets, Mihalo and his co-conspirators sold the stolen financial information, primarily the credit and debit card numbers and associated information, of tens of thousands of U.S. victims between Feb. 22, 2016, and Oct. 1, 2019.

Mihalo assembled and directed the team that helped him sell this stolen financial information on the darknet. Each of the co-conspirators benefitted from the trusted reputation Mihalo, as ggmccloud1, had built on the darknet sites to sell more stolen financial information than they would have been able to sell individually. Taylor Ross Staats, 40, of Texas, conspired with Mihalo and others to sell stolen financial information on the internet. Staats served as a “card-checker,” who ensured the financial information sold by Mihalo and others on multiple darknet sites remained active and had not been canceled by the relevant financial institutions. Staats personally earned at least $21,000 worth of Bitcoin for these services.

Mihalo personally possessed, sent, and received the information associated with 49,084 stolen payment cards with the intent that the payment card information would be trafficked on darknet sites, all in furtherance of the conspiracy. Mihalo earned at least $1 million worth of cryptocurrencies at the time of the sales, including Bitcoin, Ethereum, and Monero. These funds have significantly appreciated since that time.

Mihalo pleaded guilty to one count of conspiracy to commit access device fraud, one count of access device fraud, and six counts of money laundering. He will be sentenced on a later date. He faces a maximum penalty of five years in prison for the conspiracy count and a maximum penalty of 10 years in prison on each of the remaining counts. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Under the terms of his plea agreement, Mihalo must also forfeit to the government any property he personally obtained through the offenses, including several million dollars’ worth of cryptocurrency, financial accounts, and real property, and has agreed to entry of a money judgment of an amount to be determined by the judge at sentencing.

Mihalo is the second defendant to plead guilty in this case. Staats pleaded guilty on Dec. 14, 2022, to one count of conspiracy to commit access device fraud in connection with his role as “card-checker” for Mihalo and the other co-conspirators. He faces a maximum penalty of five years in prison for the conspiracy count and will be sentenced on a later date.

Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department’s Criminal Division, U.S. Attorney Teresa A. Moore for the Western District of Missouri, Assistant Director Bryan Vorndran of the FBI’s Cyber Division, and Special Agent in Charge Charles Dayoub of the FBI Kansas City Field Office made the announcement.

The FBI Kansas City Field Office investigated the case.

Senior Counsel Louisa Becker of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Matthew Blackwood for the Western District of Missouri are prosecuting the case. The Justice Department’s Office of International Affairs provided significant assistance.

The Justice Department also thanks its law enforcement colleagues at the Royal Canadian Mounted Police in Canada for their assistance in this case.

Stolen victim payment card information obtained over the course of the investigation has been and/or will continue to be provided to the financial institutions that issued the payment cards. If you were active on Skynet Market, AlphaBay Market, Wall Street Market, or Hansa Market; have been in contact with any of Skynet Market’s administrators; or believe your financial information may have been stolen and sold on any of these markets between Feb. 22, 2016, and Oct. 1, 2019, please file a report with the FBI’s Internet Crime Complaint Center (ic3.gov) and reference this press release.

Source: Department of Justice

Related posts:

  • Defendants Sentenced for Global Darknet Conspiracy
Category: Of NoteU.S.

Post navigation

← Franklin County Public Schools hit by ransomware attack
Patients concerned after local allergy clinic closes its doors because of alleged data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.