Hacker targeting JPMorgan and E*Trade to pay $19.95M in restitution to victims

Russian hacker Andrei Tyurin, who targeted companies such as JPMorgan and E*Trade, will have to pay restitution of $19,952,861 to victims. This becomes clear from an order signed by Judge Laura Taylor Swain of the New York Southern District Court on April 5, 2021.

The order, seen by FX News Group, states that Andrei Tyurin, the defendant, shall pay restitution in the total amount of $19,952,861, pursuant to 18 U.S.C. §§ 3663, 3663A, and 3664 to the victims of the offenses charged in Counts One, Two, Eight and Nine of the Indictment in 15 Cr. 333, and Counts One and Five of the Indictment in 19 Cr. 658.

Restitution is joint and several with defendants Gery Shalon and Joshua Samuel Aaron.

On January 7, 2021, Andrei Tyurin was sentenced in Manhattan federal court to 144 months in prison for computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies.

From approximately 2012 to mid-2015, Tyurin engaged in an extensive computer hacking campaign targeting financial institutions, brokerage firms, and financial news publishers in the U.S. and was responsible for the theft of personal information of over 100 million customers of the victim companies. His hack of J.P. Morgan Chase Bank alone resulted in the theft of personal information of over 80 million customers.

In addition to the U.S. financial sector hacks, from approximately 2007 to mid-2015 Tyurin also conducted cyberattacks against numerous U.S. and foreign companies in furtherance of various criminal enterprises, including unlawful internet gambling businesses and international payment processors.

Tyurin’s hacking activity included the targeting of companies known to be used for email marketing campaigns, competitor online casinos, and a merchant risk intelligence firm based in the United States, in order for the co-conspirators to monitor the firm’s efforts to audit potentially criminal online credit card transactions on behalf of major credit card networks, and thus avoid detection of their own criminal schemes.

The hacker used computer infrastructure located across five continents, which he controlled from his home in Moscow, and maintained persistent access over extended periods of time to the victims’ networks, regularly refreshing the stolen data by repeatedly downloading information from these companies.

Comments

Popular Posts