DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian National Pleads Guilty to Conspiracy to Introduce Malware into a U.S. Company’s Computer Network

Posted on March 19, 2021 by Dissent

More big news out of DOJ yesterday: an update on a previously reported case involving Tesla:

A Russian national pleaded guilty in federal court today for conspiring to travel to the United States to recruit an employee of a Nevada company into a scheme to introduce malicious software into the company’s computer network.

According to court documents and admissions made in court, from July 15, 2020, to Aug. 22, 2020, Egor Igorevich Kriuchkov, 27, conspired with others to recruit an employee of a large U.S. company to transmit malware provided by the conspirators into the company’s computer network. Once the malware was installed, Kriuchkov and his co-conspirators would use it to exfiltrate data from the company’s computer network and then extort the company by threatening to disclose the data.

As part of the conspiracy, Kriuchkov traveled from Russia to California through New York.  On numerous occasions between Aug. 1, 2020, and Aug. 21, 2020, Kriuchkov traveled from California to Nevada in an attempt to entice the employee to participate in this hacking scheme, offering to pay the employee with Bitcoin if the employee transmitted the malware.  After meeting with Kriuchkov, the employee reported his conduct to the victim company, which promptly contacted the FBI. The FBI then thwarted the scheme.

“The swift response of the company and the FBI prevented a major exfiltration of the victim company’s data and stopped the extortion scheme at its inception,” said Acting Assistant Attorney General Nicholas L. McQuaid of the Justice Department’s Criminal Division. “This case highlights the importance of companies coming forward to law enforcement, and the positive results when they do so.”

“This case highlights our office’s commitment to protecting trade secrets and other confidential information belonging to U.S. businesses — which is becoming even more important each day as Nevada evolves into a center for technological innovation,” said Acting U.S. Attorney Christopher Chiou for the District of Nevada. “Along with our law enforcement partners, we will continue to prioritize stopping cybercriminals from harming American companies and consumers.”

“This is an excellent example of community outreach resulting in strong partnerships, which led to proactive law enforcement action before any damage could occur,” said Special Agent in Charge Aaron C. Rouse of the FBI’s Las Vegas Field Office.

Kriuchkov pleaded guilty to one count of conspiracy to intentionally cause damage to a protected computer and is scheduled to be sentenced May 10.

The investigation was led by the FBI Las Vegas Field Office with the assistance of the FBI Los Angeles Field Office, the FBI Sacramento Field Office, and the Washoe County Sheriff’s Office in Nevada.

The case is being prosecuted by Senior Counsel C.S. Heath and Trial Attorney Thomas Dettore of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Richard Casper of the District of Nevada.

Source: Department of Justice, Office of Public Affairs
Category: Breach Incidents

Post navigation

← NZ: Lumino dental firm email hack: Patient information accessed
REvil ransomware has a new ‘Windows Safe Mode’ encryption mode →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.