Skip to main content

Information For Victims In Large Cases

When a federal criminal case reaches the prosecution stage of the criminal justice process, victims are provided with notification services concerning the status of the case. If you are a victim in an ongoing criminal case with our office, please visit the appropriate link for the case below. Feel free to contact us with any questions you may have.

Case Name

Familiar Names & Terms


U.S. v. Real Property Located at 225 Valley Road, N.W., et. al.

U.S. v. Approximately 8,671,456,050 in Iraqi Dinars, et. al.

U.S. v. Tyson Rhame, et al.

Sterling Currency Group

Iraqi dinar

GET Team

Tyson Rhame, James Shaw, and Frank Bell were convicted of mail and wire fraud conspiracy and several counts of mail and wire fraud in connection with the sale of Iraqi dinar by Sterling Currency Group, an Atlanta-based foreign currency dealer. Rhame and Bell were also convicted of making false statements to FBI agents regarding the investment potential of the Iraqi dinar. The defendants have appealed their convictions and sentences. In addition to criminal charges, the United States brought two civil forfeiture actions against personal property, bank accounts, real property, companies, and currency owned by Rhame, Shaw, and Bell. These two civil forfeiture actions have been settled, and certain property was forfeited to the United States
U.S. vs Viet Quoc Nguyen and Giang Hoang Vu/David-Manuel Santos Da Silva

Email Service Providers


21 Celsius, Inc.

Between approximately February 2009 and June 2012, at least eight Email Service Providers (ESPs) all over the United States, including two ESPs based in the Northern District of Georgia, were hacked and confidential information, including proprietary marketing data containing over one billion email addresses, was stolen. The stolen email addresses were then subjected to “spam” attacks, which involved the receipt of unsolicited emails that enticed the recipients by promoting specific products and providing hyperlinks for the recipients to purchase the products. The hyperlinks directed the recipients to affiliate marketing websites associated with

United States v. Dimitry Belorossov, a/k/a Rainerfox

Citadel malware

Citadel is a sophisticated form of malicious software or “malware” known as a “banking Trojan” designed to steal online banking credentials, credit card information, and ultimately funds through unauthorized electronic transfers.  It electronically infects the computers of unsuspecting individuals and financial institutions, creating “bots”, which cyber criminals remotely control through command and control servers.  Once the victim computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information. Used by a global syndicate of cybercriminals, Citadel is believed to have infected approximately 11 million computers worldwide and be responsible for over $500 million dollars in losses.
United States v. Aleksandr Andreevich Panin, a/k/a Harderman, a/k/a Gribodemon, and Hamza Bendelladj, a/k/a Bx1 SpyEye malware SpyEye is a sophisticated malicious computer code designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information.  SpyEye facilitates this theft of information by secretly infecting victims’ computers, enabling cyber criminals to remotely control the infected computers (or bots) through command and control (C2) servers.  Once the victims computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information through a variety of techniques, including web injects, keystroke loggers, and credit card grabbers. The victims’ stolen personal and financial data is then surreptitiously transmitted to C2 servers, where it is used to steal money from the victims’ financial accounts. Until dismantled, SpyEye was the preeminent malware banking Trojan from 2010-2012.
Updated March 15, 2024