You are here

Information For Victims In Large Cases

When a federal criminal case reaches the prosecution stage of the criminal justice process, victims are provided with notification services concerning the status of the case. If you are a victim in an ongoing criminal case with our office, please visit the appropriate link for the case below. Feel free to contact us with any questions you may have.

Case Name

Familar Names & Terms

Overview

U.S. vs Viet Quoc Nguyen and Giang Hoang Vu/David-Manuel Santos Da Silva

Email Service Providers

Spam

21 Celsius, Inc.

MarketBay.com

Between approximately February 2009 and June 2012, at least eight Email Service Providers (ESPs) all over the United States, including two ESPs based in the Northern District of Georgia, were hacked and confidential information, including proprietary marketing data containing over one billion email addresses, was stolen. The stolen email addresses were then subjected to “spam” attacks, which involved the receipt of unsolicited emails that enticed the recipients by promoting specific products and providing hyperlinks for the recipients to purchase the products. The hyperlinks directed the recipients to affiliate marketing websites associated with Marketbay.com.

United States v. Dimitry Belorossov, a/k/a Rainerfox

Citadel malware

Citadel is a sophisticated form of malicious software or “malware” known as a “banking Trojan” designed to steal online banking credentials, credit card information, and ultimately funds through unauthorized electronic transfers.  It electronically infects the computers of unsuspecting individuals and financial institutions, creating “bots”, which cyber criminals remotely control through command and control servers.  Once the victim computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information. Used by a global syndicate of cybercriminals, Citadel is believed to have infected approximately 11 million computers worldwide and be responsible for over $500 million dollars in losses.
United States v. Aleksandr Andreevich Panin, a/k/a Harderman, a/k/a Gribodemon, and Hamza Bendelladj, a/k/a Bx1 SpyEye malware SpyEye is a sophisticated malicious computer code designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information.  SpyEye facilitates this theft of information by secretly infecting victims’ computers, enabling cyber criminals to remotely control the infected computers (or bots) through command and control (C2) servers.  Once the victims computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information through a variety of techniques, including web injects, keystroke loggers, and credit card grabbers. The victims’ stolen personal and financial data is then surreptitiously transmitted to C2 servers, where it is used to steal money from the victims’ financial accounts. Until dismantled, SpyEye was the preeminent malware banking Trojan from 2010-2012.
Updated July 23, 2015

Was this page helpful?

Was this page helpful?
Yes No