A four-count indictment was unsealed today in the United States District Court for the Eastern District of New York charging Denis Gennadievich Kulkov with access device fraud, computer intrusion and money laundering in connection with his operation of Try2Check, the primary service offering “card-checking” to cybercriminals in the stolen credit card trade.
The Try2Check platform catered to cybercriminals who purchased and sold stolen credit card numbers in bulk on the internet, offering criminals the ability to quickly determine what percentage of the cards were valid and active. As such, Try2Check was a primary enabler of the trade in stolen credit card information, processing at minimum tens of millions of card numbers every year. Today, the U.S. government worked with partners in Germany and Austria to take offline Try2Check’s websites, thus dismantling the defendant’s criminal network. Along with the indictment and global website domain takedown, the State Department has announced a $10 million reward for information leading to the capture of Kulkov, who resides in Russia.
Breon Peace, United States Attorney for the Eastern District of New York and Patrick Freaney, Special Agent-in-Charge, United States Secret Service (USSS), New York Field Office, announced the charges.
“Today is a bad day for criminals who relied on the defendant’s platform as the gold standard to verify that the credit cards they stole from hard working individuals living in the Eastern District of New York and across the world had value,” stated United States Attorney Peace. “Today’s indictment and global takedown of the Try2Check website demonstrates that the Office, together with our partners, will disrupt cybercrime operations no matter where they are based.”
“The individual named in today’s indictment is accused of operating a criminal service with immeasurable reach to fund further illicit activity with global impact,” said U.S. Secret Service Special Agent in Charge Patrick J. Freaney. “Our exceptional partnerships know no borders, and thanks to the cooperation and dedication of our global law enforcement community, Try2Check can no longer serve as a vehicle for continued criminal activity or illicit profits.”
As alleged in the indictment and other court filings, Kulkov created Try2Check in 2005, building it into a primary tool of the illicit credit card trade. Cybercriminals who acquired large batches of stolen credit cards (for example, by hacking into credit card readers at stores) ran the cards through Try2Check to determine what percentage of the stolen credit card numbers remained active. These cybercriminals then used the resulting data to show prospective buyers of the stolen credit card numbers what percentage of the cards retained their value. Try2Check victimized not only credit card issuers and holders, but also a major U.S.-based payment processing company whose systems Try2Check misused to perform the card checks.
Try2Check ran tens of millions of credit card checks per year and supported the operations of major card shops that made hundreds of millions in bitcoin in profits. Over a nine-month period in 2018, the site performed at least 16 million checks, and over a 13-month period beginning in September 2021, the site performed at least 17 million checks. Through the illegal operation of his websites, the defendant made at least $18 million in bitcoin (as well as an unknown amount through other payment systems), which he used to purchase a Ferrari, among other luxury items.
In coordination with the unsealing of the charging documents in this case, Try2Check’s websites were taken offline and the State Department issued a $10 million reward for information leading to the defendant’s capture. If convicted, Kulkov faces 20 years’ imprisonment. The charges in the indictment are allegations, and the defendant is presumed innocent unless and until proven guilty.
The Office extends particular thanks to the Justice Department’s Computer Crime and Intellectual Property Section (CCIPS) and to CCIPS Assistant Deputy Chief James Yoon, for his and the Section’s extensive contributions to this case. The U.S. Secret Service New York Field Office investigated this case with crucial assistance from the following Secret Service offices: the Global Investigative Operations Center (GIOC), the Cyber Investigative Section (CIS), Frankfurt, Paris, Madrid, and the Hague. Crucial assistance was also provided by the FBI’s New York Field Office and Cyber Initiative and Resource Fusion Unit (CIRFU) and by Europol and the National Cyber-Forensics Training Alliance (NCFTA). The Department of Justice’s Office of International Affairs is assisting with foreign evidence requests. The Office extends its appreciation to the German Federal Criminal Police Office (BKA), the German Federal Office for Information Security (BSI), the Austrian Criminal Intelligence Service – Cybercrime Competence Center (C4), and the French Central Directorate of the Judicial Police (DCPJ) and the governments of Austria, Germany and France for their assistance on this case, as well as to the Shadowserver Foundation for crucial technical assistance in addressing Try2Check’s technical infrastructure.
If you have information regarding this individual, please contact the U.S. Secret Service at MostWanted@usss.dhs.gov.
The government’s case is being handled by the Office’s National Security and Cybercrime Section. Assistant United States
E.D.N.Y. Docket No.
Danielle Blustein Hass
U.S. Attorney's Office