Russian citizen sentenced in US for selling stolen financial data on criminal marketplace

Avatar

The U.S. has sentenced a Russian citizen to 40 months in prison for selling financial information and login credentials on a criminal internet marketplace called Slilpp.

Georgy Kavzharadze, 27, who went by online monikers such as “TeRorPP,” “Torqovec,” and “PlutuSS,” was extradited to the U.S. in 2022 and pleaded guilty in February of this year. He was ordered to return $1.2 million earned through illegal transactions, the U.S. Department of Justice said in a statement on Wednesday.

According to court documents, between 2016 and 2021, Kavzharadze listed over 620,000 stolen login credentials for sale on Slilpp and sold almost 300,000 of them. Buyers could use this information to potentially steal money from victims’ online payment and bank accounts.

The credentials included access to accounts with banks located in New York, California, Nevada, and Georgia. Kavzharadze accepted bitcoin as payment.

Law enforcement seized the servers and domains of Slilpp in 2021. Before it was taken down, Slilpp operated across multiple domains on the public internet and the dark web. Authorities said that in its nine-year history, Slilpp sold more than 80 million login credentials from over 1,400 companies.

The seized Slilpp database contained a wealth of historical information about Slilpp vendors, customers, and transactions, including subscriber and payment information for individual accounts used to buy and sell login credentials on the platform.

CybercrimeNews BriefsNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniukis a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Ransomware gangs rake in more than $450 million in first half of 2024

Next Post

Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says

Related Posts

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data

The North Korea-linked threat actor known as Kimsuky has been linked to the use of a new malicious Google Chrome extension that's designed to steal sensitive information as part of an ongoing intelligence collection effort. Zscaler ThreatLabz, which observed the activity in early March 2024, has codenamed the extension TRANSLATEXT, highlighting its ability to gather email addresses, usernames,
Avatar
Read More