Skip to main content

International Hacker Extradited From Italy to Face Charges in NJ

Newark

A Ukrainian citizen is scheduled to appear in Newark federal court today after being extradited from Italy to face charges that he participated in an international conspiracy to hack into the computer networks of individual users and corporations to steal log-in credentials and payment card data, U.S. Attorney Paul J. Fishman announced.

Sergey Vovnenko, a/k/a “Sergey Vovnencko,” “Tomas Rimkis,” “Flycracker,” “Flyck,” “Fly,” “Centurion,” “MUXACC1,” “Stranier,” and “Darklife,” 29, most recently of Naples, Italy, is charged by indictment with one count of wire fraud conspiracy, one count of unauthorized computer access, and four counts of aggravated identity theft. Vovnenko will appear today before U.S. Magistrate Judge Mark Falk. An arraignment has been scheduled for 2:00 p.m., Oct. 19, 2015, before U.S. District Judge Esther Salas in Newark federal court.

Vovnenko was arrested on June 13, 2014, following an international investigation led by the U.S. Secret Service in coordination with Italian law enforcement. He had been detained by the Italian authorities pending the resolution of extradition proceedings, which he contested for more than 15 months.

According to documents filed in this case and statements made in court:

From September 2010 through August 2012, Vovnenko and his conspirators operated an international criminal organization that hacked into the computers of individual users and companies located in the United States and elsewhere. They used that access to steal data, including, user names and passwords for bank accounts and other online services, as well as debit and credit card numbers and related personal identifying information.

To steal this data, Vovnenko operated a “botnet” – more than 13,000 computers infected with malicious computer software – programmed to gain unauthorized access to computers and to identify, store, and export information from hacked computers. A number of the infected computers were located in New Jersey. After stealing this data, Vovnenko and his conspirators used that information to illegally access and withdraw money from bank accounts and to incur unauthorized charges.

Vovnenko was also a high-level administrator of several online criminal forums and used his position to traffic in the data he stole as part of the conspiracy. These forums featured electronic bulletin boards, which members used to publicly communicate with all members and also send private messages directly to individual members. The public and private discussions on these forums typically pertained to criminal activity, including the purchase, sale, and use of stolen log-in credentials and payment card data, as well as discussions related to cybercrime activity such as malicious computer hacking. For example, in August 2012, one of the forums offered various illicit products for sale, including access to compromised computer servers located in the United States. A price was listed for each product, and customers could click an “order” button and purchase the product using “credits” associated with their accounts.

1,000