It took nine years, but a man U.S. authorities finally got their hands on a man they say was a player in the notorious ShadowCrew online fraud forum.
Aleksi Kolarov, 30, appeared in federal court Monday after a successful effort to extradite him from Paraguay. According to the indictment, Kolarov was involved with the Shadowcrew forum before it was dismantled by the Justice Department and the U.S. Secret Service in 2004. Kolarov was able to stay a step ahead of authorities until June 14, 2011, when police in Paraguay arrested him at a hotel with cash, counterfeit payment cards and tools to re-encode the cards.
“Aleksi Kolarov is charged with conspiring in the most notorious online cybercrime marketplace of its time, selling the means to steal money and identities to other criminals,” U.S. Attorney Fishman said in a statement. “This extradition shows that hiding behind computers and borders does not deter us. It is vital that law enforcement work internationally to bring cybercriminals to justice, no matter how long it takes.”
Shadowcrew.com was an illegal marketplace for stolen credit card and bank card information that is believed by police to have caused more than $4 million in losses to financial institutions. At one point, the site had approximately 4,000 members using the site to facilitate hacking and fraud, the Justice Department alleged.
Kolarov in particular is accused of serving as a vendor, and of using the site to sell illegal merchandise and services to other members. All totaled, 19 people have been charged with participating in the site. Of those, only three still remain at large, authorities said.
If convicted, Kolarov faces fines and a maximum penalty of five years in prison on the conspiracy count, 15 years in prison on the identification documents count and 10 years in prison on the access device count.
“The arrest and extradition of Aleksi Kolarov to the United States demonstrates the outstanding investigative abilities and steadfast commitment of the Secret Service to protect our nation’s financial infrastructure from unlawful acts committed by cyber-criminals on our homeland,” said Special Agent in Charge James Mottola of the U.S. Secret Service’s Newark Field Office, in a statement. “The successful apprehension of suspects is due to the superior efforts our special agents and participating members of the electronic crimes task forces which include federal, state and local law enforcement agencies, private industry and academia.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
- LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
- Blockchain Security Firm True I/O Raises $9 Million
- Spera Banks $10 Million to Tackle Identity and Access Sprawl
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
