IHR SEID IN ALLE FINANZNÖTE ODER BENÖTIGEN SIE
MITTEL ZU STARTEN IHR EIGENES GESCHÄFT? BRAUCHEN SIE DARLEHEN FÜR IHRE
SCHULD ZU BEGLEICHEN ODER ZAHLEN SIE IHRE RECHNUNGEN?
Wir geben Kredite
im Bereich von 7000 US-Dollar (sieben Tausend
Dollar) bis zu 50.000.000 US-Dollar (50 Millionen Dollar) mit 3 % Zinssatz.
Füllen Sie das nachstehende Formular (ist kein Formular, nur Text im Mail) für die Anwendung von Darlehen durch:
Persönliche e-Mail-Adresse:
Name: Adresse:
Land:
Telefonnummer:
Menge, die benötigt werden:
Darlehen-Dauer:
Monatliches Einkommen:
Alter:
Geschlecht:
Sie sind Beratung senden Ihre Daten an diese e-Mail-Adresse ein: scoth_smitt@ymail.com
Alles Gute
Herr Rev Scoth Smitt (Blöder gehts wohl nicht!)
Screenshot of HOCHwürden.....
MALICIOUS: HIDDEN IfRAMES ALL OVER THE PLACE & INVOLVED IN PHISHING SCAM
In summer last year, Moscow voiced outrage over the arrest of a Russian national in the Dominican Republic and his swift transfer to a US jail without Russia’s consent or knowledge and deemed Aleksander Panin’s extradition “unacceptable." Panins friend Anton Pilyugin, who was traveling with him at the time of his arrest stated: “We don’t even know what he has been accused of. We have
no clue about what to expect,”. Now, Pilyugin has closure: Aleksandr Panin, also known as “Gribodemon” and “Harderman”, pleaded Guilty to developing and distributing the infamous SpyEye Malware.
Mean, mean Boy: Aleksandr Panin
Therewith Panin acknowledged before United States District Judge Amy Totenberg, on January 28th, 2014, to conspiracy to commit wire and bank fraud for his role as the primary developer and distributor of the malicious software known as “SpyEye,” which, according to industry estimates, has infected more than 1.4 million computers in the United States and abroad.
Sally Quillian Yates
United States Attorney Sally Quillian Yates said: “As several recent and widely reported data breaches have shown, cyber attacks pose a critical threat to our nation’s economic security,” and “Today’s plea is a great leap forward in our campaign against those attacks. Panin was the architect of a pernicious malware known as SpyEye that infected computers worldwide. He commercialized the wholesale theft of financial and personal information. And now he is being held to account for his actions. Cyber criminals be forewarned - you cannot hide in the shadows of the Internet. We will find you and bring you to justice.” (I tend to say: You can run, but you cannot hide)
Mythili Raman
“Given the recent revelations of massive thefts of financial information from large retail stores across the country, Americans do not need to be reminded how devastating it is when cyber criminals surreptitiously install malicious code on computer networks and then siphon away private information from unsuspecting consumers,” said Acting Assistant Attorney General Mythili Raman.“Today, thanks to the tireless work of prosecutors and law enforcement agents, Aleksandr Panin has admitted to his orchestration of this criminal scheme to use SpyEye to invade the privacy of Americans by infecting their computers through a dangerous botnet. As this prosecution shows, cyber criminals - even when they sit on the other side of the world and attempt to hide behind online aliases - are never outside the reach of U.S. law enforcement.”
According to United States Attorney Yates, SpyEye is a sophisticated malicious computer code that is designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information. The SpyEye Malware facilitates this theft of information by secretly infecting the victims’ computer, enabling cyber criminals to remotely control the infected computer through command and control (C2C) servers. Once a computer is infected and under control, cyber criminals can remotely access the infected computers, without authorization, and steal victims’ personal and financial information through a variety of techniques, including malicious injections, keystroke logging, and credit card grabbing. The victims’ stolen personal and financial data is then stealthily transmitted to the C2C server, where it is used to steal money from the victims’ financial accounts.
Not Panins eye...
Panin was the primary developer and distributor of SpyEye. Operating out of Russia, from 2009 to 2011, Panin cooperated with other Cybercriminals, including co-defendant Hamza Bendelladj, an Algerian national also known as “Bx1,” to develop, market, and sell various versions of the SpyEye Trojan. Panin allowed cyber criminals to customize their purchases to include tailor-made methods of obtaining victims’ personal and financial information, as well as marketed versions that targeted information about specific financial institutions including banks and credit card companies. Panin advertised the SpyEye virus on online, invite-only criminal forums. He sold those versions for prices ranging from 1.000 to 8.500 USD. Panin is believed to have sold the Malware packet to at least 150 “clients” who, in turn, used them to set up their own C2C servers. One of Panin’s clients, “Soldier” is reported to have made over 3.2 million Dollars in a six-month period.
As on the pictures you can see, Hamza Bendelladj seems to enjoy the attention he received after his arrest in Thailand
SpyEye was the most dominant Malware toolkit used from approximately 2009 to 2011. Based on information received from the financial services industry, more than 10.000 bank accounts have been compromised by SpyEye infections in 2013 alone. Some cyber criminals continue to use SpyEye today, although its effectiveness has been limited since Anti-Virus Vendors makers have added SpyEye to their AV-programs.
In February 2011, compatible to a federal search warrant, the FBI searched and seized a SpyEye C2C server allegedly operated by Bendelladj in the Northern District of Georgia, that controlled more than 200 computers infected with SpyEye and contained information from numerous financial institutions.
In June and July 2011, the FBI covert sources communicated directly with Panin, who was using his online nicknames Gribodemon and Harderman, about the SpyEye virus. FBI sources then purchased a version of SpyEye from Panin that contained features designed to steal confidential financial information, initiate fraudulent online banking transactions, install keystroke loggers, and initiate distributed denial of service (DDoS) attacks from computers infected with the SpyEye malware.
On December 20, 2011, a Northern District of Georgia grand jury
returned a 23-count indictment against Panin, who had yet to be fully
identified, and Bendelladj.
The indictment charged one count of
conspiracy to commit wire and bank fraud, 10 counts of wire fraud, one
count of conspiracy to commit computer fraud, and 11 counts of computer
fraud. A overruled indictment was subsequently returned, after identifying
Panin by his true name.
Bendelladj was apprehended at Suvarnabhumi Airport in Bangkok,
Thailand, on January 5th, 2013, while he was in transit from Malaysia to
Algeria. "The smiling Hacker" was extradited from Thailand to the United States on
May 2nd, 2013. His charges are currently pendin.
The investigation also has led to the arrests by international
authorities of four of Panin’s SpyEye clients and associates in the
United Kingdom and Bulgaria.
Sentencing for Panin is scheduled for April 29th,
2014.
A Fraudster taken Down by Romanian Police for Skimming an ATM. In Europe its been common that large organized Groups of "Skimmers" are traveling through european cities using these schemes. In this Video you can observe how "quick" this is happening during daylight.
Around 160 Wholesalers & Grocery Stores (URM Stores (mainly), Yoke's Fresh Markets & Rosauers Supermarkets) across the Pacific Northwest (Idaho, Oregon, Montana and Washington) are reported to be among those whose Electronic Payment Systems were hacked by Cybercriminals, whereby the affected Chain Stores are asking customers to pay with cash or check, after they have been "advised by Law Enforcement Officials and a Financial Institutions" that they may have been the target of a Cyber Attack against its payment processing system.
URM Logo
A third party computer security firm uncovered signs of an attack, and the company says it's cooperating with law enforcement and implementing additional security measures.
Some of their customers are discovering unjustified charges on their cards. From a Lake County Man in Montana, who found $75 in gasoline purchased in Texas, to Donald Frogner of Spokane, Washington, who was stunned to find he had paid for $18 worth of food at a Kentucky Fried Chicken in New Dehli, India.
Frogner said:
“This isn’t a bunch of teenagers hacking in and getting cards. This is a sophisticated effort,”
in that some of the fraud involves using physical cards at some locations, instead of online fraud. He and his wife also saw more than $1.200 in unauthorized charges based in Florida State.
The common theme seems to be grocery stores that use URM Stores, a Spokane wholesaler, to process electronic payments, according to a Billings Gazette report. URM Stores, in turn, uses First Data Corp. of Atlanta to process its payment transactions. First Data has said it also is investigating the rash of card fraud occurring in Eastern Washington, western Montana and parts of Oregon. Computer Forensic experts also haven’t pinned down when the hack took place, or the method used. URM Stores has said it will continue to search for the source of the data breach that triggered a Sunday meeting with managers of the stores it serves.
It’s uncertain if the data breach occurred at the local store level or at some other point in the network, said URM Stores CEO Ray Sprinkle.
CEO Ray Sprinkle (left)
“Until these measures are in place, you should consider paying with cash or check,“ Ray Sprinkle wrote in a statement (PDF).“Some stores may be able to process your card through a dial-up connection that is not affected by the attack. This process takes a few more minutes at the checkout stand and we ask for your patience.“
“This is a ridiculously horrible time for this to happen,” said Yoke’s CEO John Bole on Monday morning. As families stock up on groceries and beverages for Thanksgiving, “the timing almost couldn’t be worse for area grocers.“ he said.
Jeff Philipps, CEO of Rosauers, said the 21 stores in his group will offer 10 percent discounts on all purchases made on Monday. “We feel it’s fair because we didn’t tell people ahead of time they’d have to go through this.“ he said.
Spokane Media Federal Credit Union CEO Debie Keesee said that her institution is proactively replacing about 350 credit or debit cards, in order to protect those members from ongoing possible fraud.
On Monday, the company provided a toll-free number (001-877-237-7408) for customers who have questions about what has happened and want to know what steps they can take to protect themselves.