Information for Victims in Large Cases

Displaying 81 - 90 of 152
Case Name Familiar Names and Terms District or Division Overview
Pavel Babichenko, Gennady Babitchenko, Piotr Babichenko, Timofey Babichenko, Kristina Babichenko, Natalya Babichenko, David Bibikov, Anna Iyerusalimets, Mikeal Iyerusalimets, Atrur Pupko USAO - Idaho

On August 14, 2018, a federal grand jury returned a thirty-four count indictment charging Pavel Babichenko, Gennady Babitchenko, Piotr Babichenko, Timofey Babichenko, Kristina Babichenko, Natalya Babichenko, David Bibikov, Anna Iyerusalimets, Mikhail Iyerusalimets, and Artur Pupko, with conspiracy to commit wire fraud, mail fraud, conspiracy to traffic in counterfeit trademarked goods, and money laundering conspiracy in connection with their online sale of counterfeit cellphones and accessories.

According to the indictment, the defendants operated a multi-million dollar scheme wherein they sold counterfeit cellphones and cellphone accessories on and that the defendants misrepresented as new and genuine Apple and Samsung products.  The indictment further alleges that these counterfeit cellphones and cellphone accessories were obtained in bulk from manufacturers in Hong Kong, repackaged in Idaho, and then individually resold to consumers online as genuine and new.  The conspirators also allegedly laundered millions of dollars in proceeds from the fraudulent scheme. 

If convicted, the defendants face up to 20 years’ imprisonment and a $250,000 fine on the money laundering, wire fraud, and mail fraud counts.  They face up to 10 years’ imprisonment and a $5,000,000 fine on the counterfeit trademark goods trafficking counts. 

This case is the result of a coordinated investigation by the Federal Bureau of Investigation, Department of Homeland Security, Internal Revenue Service, and United States Postal Inspection Service.

Carbanak Group, FIN7, Combi Security USAO - Washington, Western

Members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names) engaged in a highly sophisticated malware campaign targeting more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries.  FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers as well as proprietary and non-public information, which the group used or sold for profit.  In the United States alone, FIN7 successfully breached the computer networks of companies in 49 states and the District of Columbia, stealing over 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations.  Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, and Jason’s Deli.

USAO - Washington, Western

On February 15, 2018, Consuegra-Rojas was charged in the Western District of Wisconsin with multiple crimes related to access device fraud and possession of counterfeit access devices.  Consuegra-Rojas and another individual were arrested in Mauston, Wis., on September 12, 2016, after attempting to use a counterfeit credit card at a Festival Foods store.  A search of Consuegra-Rojas’s vehicle revealed counterfeit credit cards, false identification documents, 280 gift cards, multiple cellular telephones, two computers, three flash drives, six skimmers, and a credit card reader/writer.  The subsequent investigation revealed that the three flash drives and two computers contained a total of 1,679 stolen credit card numbers.  The stolen credit card numbers were used to buy gift cards and other merchandise at a variety of retailers throughout Minnesota between September 6 and September 12, 2016, including Home Depot, Walmart, and Sam’s Club.      

Amber Rose Hecker; Ronald Travis Hecker; Richard Kelly Hoglin USAO - Alaska

The defendants obtained funds to which they were not entitled by using checks stolen from the mail and stolen ID cards as well as bank cards obtained through theft and vehicle break-ins, to forge and falsely alter the stolen checks to deposit them in the accounts associated with the stolen identities and then make cash withdrawls.

Infraud Organization USAO - Nevada

Infraud Organization was created in October 2010 to promote and grow interest as the premier destination for purchasing retail items with counterfeit or stolen credit card information. Under the slogan, “In Fraud We Trust,” the organization directed traffic and potential purchasers to the automated vending sites of its members, which served as online conduits to traffic in stolen means of identification, stolen financial and banking information, malware, and other illicit goods. It also provided an escrow service to facilitate illicit digital currency transactions among its members and employed screening protocols that purported to ensure only high quality vendors of stolen cards, personally identifiable information, and other contraband were permitted to advertise to members.

USAO - Arizona

On December 11, 2017, defendants stole parcels from a home in Scottsdale. Subsequently, agents found the following: stolen mail, fraudulent IDs, counterfeit currency, equipment to produce fake IDs and counterfeit currency, and cell phones at one of the defendant’s houses.

Alejanro Arias-Perez USAO - Wisconsin, Western

On May 11, 2017, Arias-Perez was charged in the Western District of Wisconsin with installing credit card skimmers at two gas stations in Madison on August 12, 2016. On April 27, 2017. a search warrant was executed at Arias-Perez’s residence in Miami, Florida. During the search, agents located various electronic devices and equipment used for stealing credit card information. Based on a forensic analysis of the electronic equipment recovered from Arias-Perez’s residence and the recovered skimmers in the case, investigators have determined that Arias-Perez is responsible for the theft of approximately 57,000 credit card numbers.

Justin Cain USAO - Wisconsin, Western

Justin Cain was a postal employee in La Crosse, Wisconsin. He was suspected of stealing mail from the post office after he sold a stolen baseball card to a local vender. On October 18, 2013, federal agents made a controlled purchase of 23 purported gift cards from Cain. Three days later, on October 21, 2013, Cain was arrested by officers from the La Crosse Police Department with mail in his vehicle. During an interview with law enforcement officers, Cain admitted to stealing mail in order to feed his heroin addiction. Cain told investigators the stolen mail pieces were burned after items of value where removed.

United States v. Charles Hallinan USAO - Pennsylvania, Eastern

Intercept Corporation, d/b/a “InterceptEFT” (“Intercept”), a privately held corporation headquartered in Fargo, North Dakota, operating an illegal money transmittal business. Intercept was a “third party payment processor” which processed electronic funds transfers for its clients through the Automated Clearing House (“ACH”) system, an electronic payments network that processed financial transactions without using paper checks. Among Intercept’s clients were numerous business entities that issued, serviced, funded, and collected debt from short-term, high-interest loans, commonly referred to as “payday loans,” because such loans are supposed to be repaid when the borrower received his or her next paycheck or regular income payment. Payday loans are effectively illegal in more than a dozen states, including Pennsylvania, and are highly regulated in many other states.

Karim Baratov, a/k/a “Kay, ” “Karim Taloverov, ” “Karim Akehmet Tokbergenov”; Dmitry Dokuchaev, a/k/a “Patrick Nagel”; Igor Sushchin; Alexsey Belan, a/k/a “Magg”; Google; Yandex; Yahoo USAO - California, Northern

Four defendants were charged with the hacking of several mail service providers including Yahoo, Google and Yandex (Russian based server) on behalf of the Russian Federal Security Service, a/k/a the “FSB.. Defendants were also successful in obtaining user login information through spear phishing techniques.