Giant Financial Hacking Prosecution Expands

Wall Street’s main regulator sued five more Russian citizens plus four companies for their role in a computer hacking scam that generated $100 million of illicit profits from trading on nonpublic information

The traders, ranging in age from 28 to 38, used information from yet-to-be-released earnings reports to reap about $20 million in unlawful gains, the US Securities and Exchange Commission said in a statement Thursday. The regulator ordered the assets of the nine new defendants frozen. They haven’t been charged.

The SEC sued 34 traders and hackers in August while prosecutors in Brooklyn, New York, and Newark, New Jersey, indicted nine people. Authorities accused them of infiltrating computer servers of PRNewswire and Business Wire, gaining access to more than 150,000 press releases that included material, non-public information. The hackers had access to the releases over a five-year period and transmitted the stolen data through groups in Ukraine, Malta and Cyprus.

One of the indicted traders, Arkadiy Dubovoy, 51, pleaded guilty in Newark federal court to conspiracy to commit wire fraud. He faces a sentence of as long as 20 years in prison.

Dubovoy, of Alpharetta, Georgia, admitted that he bought access to stolen press releases from hackers operating out of Ukraine. He said he and others made stock trades based on news contained in the releases and that he agreed to share half his profits with the hackers. He’s the third defendant convicted in the scheme. On Jan. 20, his 29-year-old son, Igor, also pleaded guilty in Newark.

In court papers, prosecutors said evidence collected includes forensic images of hard drives on laptops and computers seized by Ukrainian authorities in November 2012 from two accused hackers, Ivan Turchynov and Oleksandr Ieremenko. They remain at large.

Information- Management: http://bit.ly/1TInS8L

« Three Pronged Attack: Chinese Military In Cyberwarfare Buildup
Great Wall: China Bans Foreign Online Publishing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.

Cyber Dexterity

Cyber Dexterity

Cyber Dexterity deliver tailored advisory and learning solutions that empower your people, customers and key stakeholders with lasting skills and capabilities.