DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Alex Yücel, co-creator of Blackshades RAT, pleads guilty

Posted on February 19, 2015 by Dissent

Well, he reportedly tried to back out of his plea deal less than two weeks ago, but yesterday, Alex Yücel,  the co-creator of the Blackshades Remote Access Tool, pleaded guilty in Manhattan federal court to one count of distribution of malicious software.

Preet Bharara, the United States Attorney for the Southern District of New York, announced the plea, and said, “Through his creation and sale of the Blackshades RAT, Alex Yücel enabled anyone, for just $40, to violate the property and privacy of his victims.”

According to the allegations in documents filed in Manhattan federal court, and statements made at the plea and other court proceedings:

Beginning in at least 2010, the “Blackshades” organization, which Yücel owned and controlled, sold and distributed malware to thousands of cybercriminals throughout the world. The RAT was typically advertised on forums for computer hackers and marketed as a product that conveniently combined the features of several different types of hacking tools. Copies of the Blackshades RAT were available for sale, typically for $40 each, on a website maintained by Blackshades.

Once a computer was infected with the RAT, the user of the RAT had complete control over the computer. The user could, among other things, remotely activate the victim’s web camera. In this way, the user could spy on anyone within view of the victim’s webcam inside the victim’s home or in any other private spaces where the victim’s computer was used. The RAT also contained a “keylogger” feature that allowed users to record each key that victims typed on their computer keyboards. To help users steal a victim’s passwords and other log-in credentials, the RAT also had a “form grabber” feature. The “form grabber” automatically captured log-in information that victims entered into “forms” on their infected computers (e.g., log-in screens or order purchase screens for online accounts).

Yücel co-created the Blackshades RAT with Michael Hogue and operated the Blackshades organization with the help of several employees. The RAT was purchased by at least several thousand users in more than 100 countries and used to infect more than half a million computers worldwide.

Yücel, 24, a Swedish national, was arrested in Moldova in November 2013. He was the first defendant ever to be extradited from Moldova to the United States. His guilty plea to distribution of malicious software carries a maximum sentence of 10 years in prison. He is scheduled to be sentenced by Judge Castel on May 22, 2015, at 11:00 a.m. The maximum potential sentences are prescribed by Congress, and are provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge.

Michael Hogue, the co-creator of the RAT, pled guilty before Judge Castel in January 2013 and is awaiting sentencing.

Brendan Johnston, an administrator for the Blackshades organization, pled guilty on November 21, 2014, before U.S. District Judge Jesse M. Furman to conspiracy to commit computer hacking, which carries a maximum sentence of 10 years in prison. He is scheduled to be sentenced by Judge Furman on May 27, 2015, at 3:30 p.m.

Marlen Rappa, a customer of Blackshades who purchased the RAT and used it to infect victims’ computers, spy on those victims using their web cameras, and steal personal files from their computers, pled guilty on October 31, 2014, before U.S. District Judge Valerie E. Caproni. He is scheduled to be sentenced by Judge Caproni on March 13, 2015, at 3:00 p.m.

Kyle Fedorek, a customer of Blackshades who purchased the RAT and used it to steal financial and other account information from more than 400 victims, pled guilty on August 19, 2014, before U.S. Magistrate Judge Gabriel W. Gorenstein and is scheduled to be sentenced by U.S. District Judge Vernon S. Broderick on February 19, 2015, at 10:00 a.m.

SOURCE: U.S. Attorney’s Office, Southern District of New York

Category: Malware

Post navigation

← Former East Texas hospital employee sentenced for criminal violation of HIPAA
U.S. Shifts Focus of Morgan Stanley Breach Probe →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.