DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Lithuanian national, extradited from Ukraine, charged with unauthorized computer intrusion, other crimes

Posted on November 21, 2019 by Dissent

A criminal complaint was unsealed today in federal court in Brooklyn charging Lithuanian national Vytautas Parfionovas with computer intrusion, securities fraud, money laundering, bank fraud and wire fraud, among other offenses.  The charged crimes stem from a variety of criminal conduct between 2011 and 2018 in which Parfionovas gained access to U.S.-based computers, including email servers and computers belonging to U.S. financial institutions, in order to steal money from online bank accounts and securities brokerage accounts.  Parfinovas was arrested in Ukraine on October 24, 2019, and was extradited to the United States on November 21, 2019.

As charged in the criminal complaint, starting in January 2011, Parfionovas and his co-conspirators engaged in a long-running scheme to steal money through a variety of computer intrusions.

In one part of the scheme, Parfionovas and his co-conspirators allegedly obtained login information for victims’ securities brokerage accounts through various methods, including stealing that information from the server of a U.S. securities order management company to which the conspirators gained unauthorized access.  The conspirators then used those accounts to steal money and conduct trades to their own benefit.  Initially, conspirators accessed the victim brokerage accounts and transferred money from those accounts to other accounts under their control.  After financial institutions began to block those unauthorized transfers, Parfionovas and his co-conspirators accessed other victim brokerage accounts without authorization, and placed unauthorized stock trades within those accounts while simultaneously trading profitably in the same stocks from accounts that they controlled.  On or about February 22, 2016, Parfionovas explained this aspect of the scheme to a co-conspirator as follows:  “I take some fraud logins.  Do some s[_]t with stock . . . sometimes 2-3 in day . . . manipulation is 100%.”  In this manner, Parfionovas and his co-conspirators realized financial gains while causing losses of more than $5.5 million.

In another part of the scheme, Parfionovas and his co-conspirators allegedly obtained login information for victim email accounts and accessed those accounts without authorization.  The conspirators then sent email messages from those accounts to the victims’ financial advisers and requested wire transfers from the victims’ financial institutions to overseas bank accounts that the conspirators controlled.  For example, in or about May 2013, Parfionovas and his co-conspirators obtained $50,000 from an investment account that belonged to U.S. victims, and Parfionovas directed the transfer of those funds to a series of bank accounts and ultimately to an individual in Kharkov, Ukraine, where Parfionovas was located.  To defraud another victim, Parfionovas and his co-conspirators obtained control over a victim’s email account and used it to send written instructions—which falsely appeared to have been signed by the victim—to transfer $225,000 from one of the victim’s accounts.

If convicted, the defendant faces up to 30 years’ imprisonment for the money laundering charge, and a mandatory consecutive two-year sentence for the charge of aggravated identity theft.

The charges in the complaint announced today are allegations, and the defendant is presumed innocent unless and until proven guilty.

The government’s case is being handled by the Office’s National Security and Cybercrime Section and the Business and Securities Fraud Section.  Assistant United States Attorneys David K. Kessler, Mark E. Bini and Alexander Mindlin are in charge of the prosecution.  The Justice Department’s Office of International Affairs of the Department’s Criminal Division provided significant assistance in securing the defendant’s extradition from Ukraine.

The Defendant: 

VYTAUTAS PARFIONOVAS
Age: 32
Kiev, Ukraine

E.D.N.Y. Docket No. 19-MJ-883

Attachment(s):
Download Parfionovas Complaint Redacted
Excerpted from: U.S. Attorney’s Office, Eastern District of New York. For the full press release, click here.

Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Qantas obtains injunction to prevent hacked data’s release
  • North Country Healthcare responds to Stormous's claims of a breach
Category: Financial SectorHack

Post navigation

← Yet another city reports a Click2Gov breach
Personal And Social Information Of 1.2 Billion People Discovered In Massive Data Leak, But Who’s Responsible?? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.