DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ukrainian National Sentenced to Federal Prison in “Raccoon Infostealer” Cybercrime Case

Posted on December 18, 2024 by Dissent

AUSTIN, Texas – Ukrainian national Mark Sokolovsky was sentenced today to 60 months in federal prison for one count of conspiracy to commit computer intrusion.

According to court documents, Sokolovsky, 28, conspired to operate the Raccoon Infostealer as a malware-as-a-service or “MaaS.” Individuals who deployed Raccoon Infostealer to steal data from victims leased access to the malware for approximately $200 per month, paid for by cryptocurrency. These individuals used various ruses, such as email phishing, to install the malware onto the computers of unsuspecting victims. Raccoon Infostealer then stole personal data from victim computers, including log-in credentials, financial information, and other personal records. Stolen information was used to commit financial crimes or was sold to others on cybercrime forums.

In March 2022, concurrent with Sokolovsky’s arrest by Dutch authorities, the FBI and law enforcement partners in Italy and the Netherlands dismantled the digital infrastructure supporting the Raccoon Infostealer, taking its then existing version offline. Sokolovsky was extradited from the Netherlands in February 2024 after being indicted for crimes related to fraud, money laundering and aggravated identity theft.

As part of his plea in October, Sokolovsky agreed to forfeit $23,975 and pay at least $910,844.61 in restitution.

“Mark Sokolovsky was a key player in an international criminal conspiracy that victimized countless individuals by administering malware which made it cheaper and easier for even amateurs to commit complex cybercrimes,” said U.S. Attorney Jaime Esparza for the Western District of Texas. “Today’s outcome is the result of tireless investigative efforts by multiple law enforcement agencies in several countries and we reiterate our thanks to our international partners for their essential work. My office will not stop in its efforts to hold cybercriminals accountable for their misdeeds.”

“Sokolovsky’s infostealer was responsible for compromising more than 52 million user credentials, which were then used in furtherance of fraud, identity theft, and ransomware attacks on millions of victims worldwide,” said Special Agent in Charge Aaron Tapp for the FBI’s San Antonio field office. “We want to thank our Cyber Task Force and international partners for their assistance in bringing Sokolovsky to justice. Cases like this are a priority for the FBI and we encourage anyone who has been a victim of a financial scam to go to www.IC3.gov.”

The FBI’s Austin Cyber Task Force investigated the case with the assistance of the Department of the Army Criminal Investigation Division, the Austin Police Department, the Naval Criminal Investigative Service, the Round Rock Police Department and the Texas Department of Public Safety.

Assistant U.S. Attorney G. Karthik Srinivasan prosecuted the case.

Victims of the Raccoon Infostealer can find more information at www.justice.gov/usao-wdtx/victim-assistance-raccoon-infostealer.

Source:  U.S. Attorney’s Office, Western District of Texas

Related posts:

  • Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation
  • Ukrainian National Pleads Guilty to “Raccoon Infostealer” Cybercrime
  • Two Foreign Nationals Plead Guilty to Participation in LockBit Ransomware Group
  • U.S. Joins International Action Against RedLine and META Infostealers; unseals charges against Maxim Rudometov (1)
Category: Malware

Post navigation

← Defending Data Breach Class Actions
Israeli hacker alleged to be software dev for LockBit faces extradition to U.S. for role in global ransomware network →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.