Cool Audit

Coolaudit
Russian Hackers Charged for Selling Unauthorized access to computer networks

A Russian citizen has been indicted for working as an “access broker” and selling unauthorized access to computer networks, including a victim company in New Jersey, U.S. Attorney Philip R. Sellinger, District of New Jersey, announced.

 

Details of the Indictment

Evgeniy Doroshenko, 31, also known as “Eugene Doroshenko,” “FlankerWWH,” and “Flanker,” of Astrakhan, Russia, faces charges of one count of wire fraud and one count of fraud and related activity in connection with computers.

According to court documents and statements, from February 2019 to May 2024, Doroshenko orchestrated a scheme to gain unlawful access to victims’ computer systems.

He then sold this access for profit through a Russian-language cybercrime forum on the dark web.

In January 2024, Doroshenko gained unauthorized access to a company’s computer network in Bergen County, New Jersey, and subsequently offered to sell this access to other cybercriminals via the forum.

Cybercrime forums, like the one used by Doroshenko, are online platforms where cybercriminals promote and facilitate a wide range of illegal activities, including computer hacking and trafficking in stolen data.

A wire fraud charge carries a maximum punishment of 20 years in prison and a fine of $250,000, or twice the gross amount of gain or loss resulting from the offense, whichever is greater.

U.S. Attorney Sellinger credited special agents of Homeland Security Investigations Newark, under the direction of Acting Special Agent in Charge William S. Walker, and special agents of the U.S. Secret Service, under the direction of Special Agent in Charge Aaron Hatley, Newark Field Office, with the investigation leading to the charges.

Assistant U.S. Attorney David E. Malagold of the Cybercrime Unit in Newark represents the government.

The charges and allegations in the indictment are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

 

Source: https://bit.ly/3uS5LZ2