Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|United States v. Vaccaro et al. and United States v. Eli Taieb||Charles Vaccaro, Dror Svorai, Dennis Ruggeri, Kevin Hagen, Gary Berlly, Yosef Biton, Eli Taieb, PotNetwork Holdings Inc. ('POTN'), Vapor Group Inc. ('VPOR'), CLIC Technology Inc. ('CLIC'), White Label Liquid Inc. ('WLAB'), Canna Corporation ('CNCC'), and Grand Capital Ventures Inc. ('GRCV')||USAO - Ohio, Northern||
The US Attorney's Office for the Northern District of Ohio alleges that between January 1, 2014 – July 19, 2019 Defendants obtained millions of shares in certain public companies at little or no cost and then profited by selling those shares to investors at fraudulent and artificially inflated prices without disclosing their control of those shares or relationship with the companies.
|United States v. V. C.||SSNDOB, SSNDOB.CLUB; SSNDOB.WS||USAO - Florida, Middle||
From at least January 2015 through the present, V. C., S. P., and O. G. conspired with each other and others to operate websites, including SSNDOB.WS and SSNDOB.CLUB (collectively, “SSNDOBCLUB”), that sold personally identifiable information of U.S. residents (“PII”), including names, social security numbers, and addresses. In the United States, such PII can be used to open credit cards or bank accounts in those individuals’ names, file false and fraudulent U.S. tax returns in those names, and file false and fraudulent claims for unemployment benefits in those names, among other crimes. The U.S. investigation has determined that since 2017, both websites have listed the PII for approximately 24,000,000 U.S. individuals and generated more than 19,000,000 USD in sales.
|US v. Mark Sokolovsky||Raccoon Infostealer, Raccoon, Photix, black21jack77777||Antitrust Division, USAO - Texas, Western||
Raccoon Infostealer is malicious software that infects computers and steals personal information, including email addresses, identification numbers, bank account information, and cryptocurrency information. Criminal actors can use the stolen information to commit identity theft, financial fraud, or other crimes. Raccoon Infostealer infected computers in many countries from 2018 through early 2022. Mark Sokolovsky is alleged to be one of the key administrators behind the Raccoon Infostealer. He has been charged with conspiracy to violate the Computer Fraud and Abuse Act, money laundering, wire fraud, and aggravated identity theft. For more information and resources on Raccoon Infostealer, including a site that can tell you whether your email address may have been stolen, please visit the links below.
|United States v. Ravi Kumar Chermala||Civil Division||
Former Kerry, Inc. Manager Ravi Chermala Pleads Guilty in Connection with Insanitary Plant Conditions Linked to 2018 Salmonella Poisoning Outbreak
|United States v. Michael Malekzadeh and Bethany Mockerman||Zadeh Kicks||USAO - Oregon||
Malekzadeh started his business in 2013 by purchasing limited edition and collectible sneakers to resell online. Beginning as early as January 2020, Zadeh Kicks began offering preorders of sneakers before their public release dates, allowing Malekzadeh to collect money upfront before fulfilling orders. Malekzadeh advertised, sold, and collected payments from customers for preorders knowing he could not satisfy all orders placed. By April 2022, Malekzadeh owed customers more than $70 million in undelivered sneakers and unknown additional millions held by customers in worthless company gift cards. In her role as Zadeh Kicks chief financial officer, Mockerman conspired with Malekzadeh to provide false and altered financial information to numerous financial institutions—including providing altered bank statements—on more than 15 bank loan applications. Together, Mockerman and Malekzadeh received more than $15 million in loans from these applications.
|US v. Post et al||Jared Post, Levi Skulstad||USAO - Alaska||
The defendants have been charged with a years-long Conspiracy to Commit Bank Fraud and Wire Fraud, Bank Fraud, Wire Fraud, Aggravated Identity Theft, and Conspiracy to Commit Money Laundering. The indictment charges them with fraudulently obtaining a total of at least $500,000 from Alaska USA and other federally insured banking institutions. The defendants additionally stole checks and used banking information from countless other victims to further the scheme.
|United States v. Onur Aksoy a/k/a “Ron Aksoy” a/k/a “Dave Durden” (Pro Network)||USAO - New Jersey||
From 2013 through 2022, the defendant, Onur Aksoy, ran a massive operation, broadly named “Pro Network,” to traffic in counterfeit and fraudulent Cisco networking devices. Aksoy and his coconspirators then resold these devices in the United States and around the world, falsely representing them as new, genuine, and high-quality Cisco products. Aksoy trafficked in and resold tens of thousands of such counterfeit and fraudulent devices, which carried an estimated retail value of more than one billion dollars.
|United States v. Amplify Energy Corp., Beta Operating Company, LLC, and San Pedro Bay Pipeline Company||Amplify Energy Corp., Beta Operating Company, LLC, San Pedro Bay Pipeline Company||USAO - California, Central||
On December 15, 2021, Amplify Energy Corp., Beta Operating Company, LLC, and San Pedro Bay Pipeline Company were indicted on one count of negligent discharge of oil into the contiguous zone of the United States (33 U.S.C. §§ 1321(b)(3), 1319(c)(1)(A)), in a case arising out of the oil spill off of Huntington Beach, California on October 1 and 2, 2021. According to the indictment, defendants own and operate the 17-mile-long San Pedro Bay Pipeline that transports oil from offshore platforms to Long Beach, California. The indictment alleges that, on October 1 and 2, 2021, defendants illegally discharged oil into the Pacific Ocean by acting negligently in at least six different ways in response to the Pipeline’s leak alarms. As a result of the discharge, approximately 25,000 gallons of crude oil leaked from the Pipeline into the San Pedro Bay.
|United States v. Joseph Sullivan||n/a||USAO - California, Northern||
Failure by former Uber CSO, Joseph Sullivan, to disclose 2016 breach to affected UBER drivers. Hackers revealed that they had accessed and downloaded an Uber database containing the personally identifying information “PII” of approx. 600,000 drivers.
|United States v. Tanner Roughton||Tanner Roughton||USAO - Pennsylvania, Eastern||
Defendant Tanner Roughton is charged with one count of conspiracy to commit wire fraud, one count of wire fraud, and one count of filing a false tax returns. The charges stem from Roughton’s participation in scheme to defraud buyers and sellers of two cryptocurrencies by manipulating the price of the cryptocurrencies through various means, including the release of false statements designed to bolster the sale price and generate trading volume, and matched trades with a co-schemer and others to further generate trading volume. The charges allege that Roughton sold the cryptocurrencies for a profit and knowingly failed to report his profits on his tax returns.