Information for Victims in Large Cases
United States vs. Peter Levashov
Peter Levashov has been charged with one count of causing intentional damage to a protected computer, one count of conspiracy, one count of accessing protected computers in furtherance of fraud, one count of wire fraud, one count of threatening to damage a protected computer, two counts of fraud in connection with email and one count of aggravated identity theft. On September 12, 2018, Levashov entered into a guilty plea, thus admitting in open court to his criminal conduct and avoiding the need for a trial. Since the late 1990s until his arrest in April 2017, Levashov controlled and operated multiple botnets, including the Storm, Waledac and Kelihos botnets, to harvest personal information and means of identification from infected computers. To further the scheme, Levashov disseminated spam and distributed other malware, such as banking Trojans and ransomware, and advertised the Kelihos botnet spam and malware services to others for purchase in order to enrich himself. Over the course of his criminal career, Levashov participated in and moderated various online criminal forums on which stolen identities and credit cards, malware and other criminal tools of cybercrime were traded and sold. Sentencing is currently scheduled for September 6, 2019. Levashov is detained pending sentencing.
US v. Frederick Voight
Frederick Voight has been charged with mail fraud, wire fraud, and money laundering in relationship to a fraudulent investment scheme in which he victimized several hundred individuals. The Indictment alleges that Frederick Voight committed fraud by utilizing the United States Postal Service and wire transfers in the district of Nebraska and elsewhere across the United States to advance his scheme. It is alleged that through companies he controlled, Frederick Voight devised a scheme to defraud investors who placed money with him to invest in business entities. Frederick Voight obtained money from said investors by means of material false and fraudulent promises/pretenses that he would place the funds as represented. These statements, representations and promises deprived investors of materially valuable information investors needed in deciding how to use their assets and monies.
United States v. Babatunde Martins et al./Operation Keyboard Warrior
In accordance with the Justice Department’s recent efforts to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens, the Department has previously announced Operation Keyboard Warrior, an effort coordinated by United States and international law enforcement to disrupt online frauds perpetrated from Africa. To date, eight individuals have been arrested for their roles in a widespread, Africa-based cyber conspiracy that allegedly defrauded U.S. companies and citizens of approximately $15 million since at least 2012.
An indictment against eleven individuals was returned by a grand jury in the U.S. District Court for the Western District of Tennessee on Aug. 23, 2017, and charges the defendants with conspiracy to commit wire fraud, wire fraud, conspiracy to commit money laundering, conspiracy to commit computer fraud, and aggravated identity fraud.
U.S. vs. Babichenko, et. al.
On August 14, 2018, a federal grand jury returned a thirty-four count indictment charging Pavel Babichenko, Gennady Babitchenko, Piotr Babichenko, Timofey Babichenko, Kristina Babichenko, Natalya Babichenko, David Bibikov, Anna Iyerusalimets, Mikhail Iyerusalimets, and Artur Pupko, with conspiracy to commit wire fraud, mail fraud, conspiracy to traffic in counterfeit trademarked goods, and money laundering conspiracy in connection with their online sale of counterfeit cellphones and accessories.
According to the indictment, the defendants operated a multi-million dollar scheme wherein they sold counterfeit cellphones and cellphone accessories on Amazon.com and eBay.com that the defendants misrepresented as new and genuine Apple and Samsung products. The indictment further alleges that these counterfeit cellphones and cellphone accessories were obtained in bulk from manufacturers in Hong Kong, repackaged in Idaho, and then individually resold to consumers online as genuine and new. The conspirators also allegedly laundered millions of dollars in proceeds from the fraudulent scheme.
If convicted, the defendants face up to 20 years’ imprisonment and a $250,000 fine on the money laundering, wire fraud, and mail fraud counts. They face up to 10 years’ imprisonment and a $5,000,000 fine on the counterfeit trademark goods trafficking counts.
This case is the result of a coordinated investigation by the Federal Bureau of Investigation, Department of Homeland Security, Internal Revenue Service, and United States Postal Inspection Service.
U.S. v. Fedir Oleksiyovych Hladyr, U.S. v. Dmytro Valerievich Fedorov, U.S. v. Andrii Kolpakov, U.S. v. Denys Iarmak
Members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names) engaged in a highly sophisticated malware campaign targeting more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries. FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers as well as proprietary and non-public information, which the group used or sold for profit. In the United States alone, FIN7 successfully breached the computer networks of companies in 49 states and the District of Columbia, stealing over 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations. Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, and Jason’s Deli.
United States v. Jorge Consuegra-Rojas
On February 15, 2018, Consuegra-Rojas was charged in the Western District of Wisconsin with multiple crimes related to access device fraud and possession of counterfeit access devices. Consuegra-Rojas and another individual were arrested in Mauston, Wis., on September 12, 2016, after attempting to use a counterfeit credit card at a Festival Foods store. A search of Consuegra-Rojas’s vehicle revealed counterfeit credit cards, false identification documents, 280 gift cards, multiple cellular telephones, two computers, three flash drives, six skimmers, and a credit card reader/writer. The subsequent investigation revealed that the three flash drives and two computers contained a total of 1,679 stolen credit card numbers. The stolen credit card numbers were used to buy gift cards and other merchandise at a variety of retailers throughout Minnesota between September 6 and September 12, 2016, including Home Depot, Walmart, and Sam’s Club.
US. v. Hecker, et al.
The defendants obtained funds to which they were not entitled by using checks stolen from the mail and stolen ID cards as well as bank cards obtained through theft and vehicle break-ins, to forge and falsely alter the stolen checks to deposit them in the accounts associated with the stolen identities and then make cash withdrawls.
U.S. v. Svyatoslav Bondarenko, et al
Infraud Organization was created in October 2010 to promote and grow interest as the premier destination for purchasing retail items with counterfeit or stolen credit card information. Under the slogan, “In Fraud We Trust,” the organization directed traffic and potential purchasers to the automated vending sites of its members, which served as online conduits to traffic in stolen means of identification, stolen financial and banking information, malware, and other illicit goods. It also provided an escrow service to facilitate illicit digital currency transactions among its members and employed screening protocols that purported to ensure only high quality vendors of stolen cards, personally identifiable information, and other contraband were permitted to advertise to members.
US v. Amber Nicole Lamb & Randy Mitchell Kinny
On December 11, 2017, defendants stole parcels from a home in Scottsdale. Subsequently, agents found the following: stolen mail, fraudulent IDs, counterfeit currency, equipment to produce fake IDs and counterfeit currency, and cell phones at one of the defendant’s houses.
United States v. Alejandro Arias-Perez
On May 11, 2017, Arias-Perez was charged in the Western District of Wisconsin with installing credit card skimmers at two gas stations in Madison on August 12, 2016. On April 27, 2017. a search warrant was executed at Arias-Perez’s residence in Miami, Florida. During the search, agents located various electronic devices and equipment used for stealing credit card information. Based on a forensic analysis of the electronic equipment recovered from Arias-Perez’s residence and the recovered skimmers in the case, investigators have determined that Arias-Perez is responsible for the theft of approximately 57,000 credit card numbers.
United States v. Christian Meissenn, et al.
Christian Meissenn, William Lieberman, Damian Delgado (also known as Michael Neumann), and others ran a securities fraud “pump and dump” scheme. The defendants fraudulently induced investors to purchase stocks issued by shell companies under the control of Lieberman and other co-conspirators. The effect was to artificially boost the trading volume of the securities, create the appearance of liquidity, and falsely drive up the share price. The defendants and their co-conspirators then sold their own shares at a profit before allowing the price of the securities to fall, leaving investors with worthless and unsalable stock. As a result, victim investors lost millions of dollars. The defendants laundered their profits through the trust accounts of various attorneys, including Corey Brinson. The issuing companies involved in the scheme included Terra Energy Resources Ltd. (stock symbol “TRRE”); Mammoth Energy Group, Inc. (stock symbol “MMTE”), a company that later became Strategic Asset Leasing Inc. (stock symbol “LEAS”); Trilliant Exploration Corporation (stock symbol “TTXP”); Hermes Jets, Inc. (stock symbol “HRMJ”), which later became Continental Beverage Brands Corporation (stock symbol “CBBB”); Dolat Ventures, Inc. (stock symbol “DOLV”), and Fox Petroleum, Inc. (stock symbol “FXPT”). Meissenn, Lieberman, and Delgado have pleaded guilty to conspiracy to commit mail and wire fraud, and tax evasion charges. They await sentencing. Brinson has pleaded guilty to money laundering, and has been sentenced to 3 years in prison.
U.S. v. Fathallah Mashali
Fathallah Mashali, 62, of Dover, Mass., pleaded guilty on March 15, 2017 in U.S. District Court in Boston to 27 counts of health care fraud, one count of conspiracy to commit mail fraud, and 16 counts of money laundering. Sentencing is scheduled for June 21, 2017. Mashali was a licensed physician in Massachusetts and Rhode Island. Mashali operated New England Wellness & Pain Management, P.C., a/k/a New England Pain Associates, P.C., of Massachusetts and Rhode Island, a/k/a Greystone Pain Management, Inc., a/k/a New England Pain Institute, P.C. (NEPA). He also employed Egyptian doctors in Cairo, Egypt, who entered false information into U.S. patients’ medical records. Many of the patients at NEPA were Medicare beneficiaries.