Russian Aleksandr Andreevich Panin has pleaded guilty to conspiracy to commit wire and bank fraud for his role as primary developer and distributor of the SpyEye bank fraud Trojan, the U.S. Department of Justice said Tuesday.
Panin, known as Gribodemon and Harderman, was primary developer of SpyEye, a sophisticated, malicious computer Trojan designed to automate the theft of confidential personal and financial information, including online banking credentials, credit card information, user names and passwords, the DOJ said in a press release. The virus has infected an estimated 1.4 million computers worldwide since 2009.
The SpyEye code secretly infects victims' computers, enabling cybercriminals to remotely control the infected computers through command and control, or C2, servers. After a computer is infected and under their control, cybercriminals can remotely access the infected computers, without authorization, and steal victims' personal and financial information through a variety of techniques, including keystroke loggers, and credit card grabbers, the DOJ said. The victims' stolen personal and financial data is then transmitted to the C2 servers, where it is used to steal money from the victims' financial accounts.
Panin was the primary developer and distributor of the SpyEye malware package, the DOJ said. Operating from Russia from 2009 to 2011, he conspired with others, including codefendant Hamza Bendelladj, an Algerian national also known as Bx1, to develop, market and sell various versions of the SpyEye virus and component parts on the Internet, the agency alleged.
Panin allowed cybercriminals to customize their purchases to include tailor-made methods of obtaining victims' personal and financial information, and he marketed versions that specifically targeted designated financial institutions, the DOJ said. Panin advertised the SpyEye virus on online, invitation-only criminal forums. He sold versions of SpyEye for US$1,000 to $8,500.
Investigators believe he sold SpyEye to at least 150 clients, who, in turn, used them to set up their own C2 servers. One of Panin's clients, nicknamed Soldier, is believed to have made more than $3.2 million in a six-month period using SpyEye.
"Given the recent revelations of massive thefts of financial information from large retail stores across the country, Americans do not need to be reminded how devastating it is when cybercriminals surreptitiously install malicious codes on computer networks and then siphon away private information from unsuspecting consumers," Acting Assistant U.S. Attorney General Mythili Raman said in a statement. "As this prosecution shows, cyber criminals -- even when they sit on the other side of the world and attempt to hide behind online aliases -- are never outside the reach of U.S. law enforcement."
SpyEye was the preeminent malware toolkit used from approximately 2009 to 2011, but it continues to infect computers today, the DOJ said.
In February 2011, using a federal search warrant, the U.S. Federal Bureau of Investigation searched and seized a SpyEye C2 server allegedly operated by Bendelladj in the U.S. state of Georgia, the DOJ said. The server controlled over 200 computers infected with the SpyEye virus and contained information from numerous financial institutions.
Sign up for CIO Asia eNewsletters.