Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|United States vs. Peter Levashov||Peter Yuryevich Levashov, aka “Petr Levashov, ” “Peter Severa, ” “Petr Severa” and “Sergey Astakhov||USAO - Connecticut||
Peter Levashov has been charged with one count of causing intentional damage to a protected computer, one count of conspiracy, one count of accessing protected computers in furtherance of fraud, one count of wire fraud, one count of threatening to damage a protected computer, two counts of fraud in connection with email and one count of aggravated identity theft. On September 12, 2018, Levashov entered into a guilty plea, thus admitting in open court to his criminal conduct and avoiding the need for a trial. Since the late 1990s until his arrest in April 2017, Levashov controlled and operated multiple botnets, including the Storm, Waledac and Kelihos botnets, to harvest personal information and means of identification from infected computers. To further the scheme, Levashov disseminated spam and distributed other malware, such as banking Trojans and ransomware, and advertised the Kelihos botnet spam and malware services to others for purchase in order to enrich himself. Over the course of his criminal career, Levashov participated in and moderated various online criminal forums on which stolen identities and credit cards, malware and other criminal tools of cybercrime were traded and sold. Sentencing is currently scheduled for September 6, 2019. Levashov is detained pending sentencing.
|US v. Frederick Voight||USAO - Nebraska||
Frederick Voight has been charged with mail fraud, wire fraud, and money laundering in relationship to a fraudulent investment scheme in which he victimized several hundred individuals. The Indictment alleges that Frederick Voight committed fraud by utilizing the United States Postal Service and wire transfers in the district of Nebraska and elsewhere across the United States to advance his scheme. It is alleged that through companies he controlled, Frederick Voight devised a scheme to defraud investors who placed money with him to invest in business entities. Frederick Voight obtained money from said investors by means of material false and fraudulent promises/pretenses that he would place the funds as represented. These statements, representations and promises deprived investors of materially valuable information investors needed in deciding how to use their assets and monies.
|U.S. v. Roberto Dip and Jason Handal||Dip; Roberto Dip; Jason Handal; Freight Forwarders; Central Freight; Forwarders||Antitrust Division||
Roberto Dip and Jason Handal were charged with engaging in a conspiracy to suppress and eliminate competition by fixing prices for freight forwarding services provided in the United States and elsewhere from as early as September 2010 and continuing until at least March 2015.
|U.S. v. Gennex Media, LLC||Gennex; Gennex Media LL; Wristbands; Lanyards; Buttons; Temporary Tattoos; Promotional Products||Antitrust Division||
Gennex was charged with engaging in a conspiracy to suppress and eliminate competition by fixing and maintaining prices of customized promotional products, including wristbands, lanyards, buttons and temporary tattoos, sold in the United States and elsewhere, from at least as early as May 2014 and continuing until at least June 2016.
|U.S. v. Akil Kurji||Akil Kurji; Kurji; Wristbands; Lanyards; Buttons; Temporary Tattoos; Promotional Products||Antitrust Division||
Akil Kurji was charged with engaging in a conspiracy to suppress and eliminate competition by fixing and maintaining prices of customized promotional products, including wristbands, lanyards, buttons and temporary tattoos, sold in the United States and elsewhere, from at least as early as May 2014 and continuing until at least June 2016.
|United States v. Babatunde Martins et al./Operation Keyboard Warrior||Alexandr Duimont, Andrew (Andy) Jackson, Brianna Lee, Brianna Morrison, Carolina Nkomo, Christian Hinds, Daniel Elya, Daniel Roberts, Dr. Dennis Brown, James, James Yorke, Joey Hammond, Jon Bunyan, Marc Richards, Rob Phantom, Sandra Lin, Sherry Jupiter Martinez, Sual Derrell, Tammy Dollan, Tammy Henry||USAO - Tennessee, Western||
In accordance with the Justice Department’s recent efforts to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens, the Department has previously announced Operation Keyboard Warrior, an effort coordinated by United States and international law enforcement to disrupt online frauds perpetrated from Africa. To date, eight individuals have been arrested for their roles in a widespread, Africa-based cyber conspiracy that allegedly defrauded U.S. companies and citizens of approximately $15 million since at least 2012.
An indictment against eleven individuals was returned by a grand jury in the U.S. District Court for the Western District of Tennessee on Aug. 23, 2017, and charges the defendants with conspiracy to commit wire fraud, wire fraud, conspiracy to commit money laundering, conspiracy to commit computer fraud, and aggravated identity fraud.
|U.S. v. Detloff Marketing & Asset Mgmt., Inc., et al.||REO; Jeff Detloff; Lori Detloff; Detloff Marketing & Asset Mgmt.; DMAM; Residential Remodelers||Antitrust Division||
The indictment charges Detloff Marketing and Asset Management Inc., realtor Jeffery J. Detloff, and accountant Lori K. Detloff, with conspiring to defraud companies, including financial institutions, in connection with foreclosed properties in the Minneapolis area and elsewhere from in or about September 2007 and continuing through in or about June 2015. In addition to the conspiracy charge, the indictment alleges four counts of wire fraud and four counts of mail fraud.
|U.S. vs. Babichenko, et. al.||Pavel Babichenko, Gennady Babitchenko, Piotr Babichenko, Timofey Babichenko, Kristina Babichenko, Natalya Babichenko, David Bibikov, Anna Iyerusalimets, Mikeal Iyerusalimets, Atrur Pupko||USAO - Idaho||
On August 14, 2018, a federal grand jury returned a thirty-four count indictment charging Pavel Babichenko, Gennady Babitchenko, Piotr Babichenko, Timofey Babichenko, Kristina Babichenko, Natalya Babichenko, David Bibikov, Anna Iyerusalimets, Mikhail Iyerusalimets, and Artur Pupko, with conspiracy to commit wire fraud, mail fraud, conspiracy to traffic in counterfeit trademarked goods, and money laundering conspiracy in connection with their online sale of counterfeit cellphones and accessories.
According to the indictment, the defendants operated a multi-million dollar scheme wherein they sold counterfeit cellphones and cellphone accessories on Amazon.com and eBay.com that the defendants misrepresented as new and genuine Apple and Samsung products. The indictment further alleges that these counterfeit cellphones and cellphone accessories were obtained in bulk from manufacturers in Hong Kong, repackaged in Idaho, and then individually resold to consumers online as genuine and new. The conspirators also allegedly laundered millions of dollars in proceeds from the fraudulent scheme.
If convicted, the defendants face up to 20 years’ imprisonment and a $250,000 fine on the money laundering, wire fraud, and mail fraud counts. They face up to 10 years’ imprisonment and a $5,000,000 fine on the counterfeit trademark goods trafficking counts.
This case is the result of a coordinated investigation by the Federal Bureau of Investigation, Department of Homeland Security, Internal Revenue Service, and United States Postal Inspection Service.
|U.S. v. Fedir Oleksiyovych Hladyr, U.S. v. Dmytro Valerievich Fedorov, U.S. v. Andrii Kolpakov||Carbanak Group, FIN7, Combi Security||USAO - Washington, Western||
Members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names) engaged in a highly sophisticated malware campaign targeting more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers as well as proprietary and non-public information, which the group used or sold for profit. In the United States alone, FIN7 successfully breached the computer networks of companies in 49 states and the District of Columbia, stealing over 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations. Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, and Jason’s Deli.
|United States v. Jorge Consuegra-Rojas||USAO - Washington, Western||
On February 15, 2018, Consuegra-Rojas was charged in the Western District of Wisconsin with multiple crimes related to access device fraud and possession of counterfeit access devices. Consuegra-Rojas and another individual were arrested in Mauston, Wis., on September 12, 2016, after attempting to use a counterfeit credit card at a Festival Foods store. A search of Consuegra-Rojas’s vehicle revealed counterfeit credit cards, false identification documents, 280 gift cards, multiple cellular telephones, two computers, three flash drives, six skimmers, and a credit card reader/writer. The subsequent investigation revealed that the three flash drives and two computers contained a total of 1,679 stolen credit card numbers. The stolen credit card numbers were used to buy gift cards and other merchandise at a variety of retailers throughout Minnesota between September 6 and September 12, 2016, including Home Depot, Walmart, and Sam’s Club.