TECHNOLOGY 

JPMorgan Bank Hacking Israelis – FBI & SEC – The Arrested Israeli Suspects Right – Shalon Left – Orenstein in Israeli Court Today 22/7/15 – Ynet

JPMorgan Bank Hacking Israelis - FBI & SEC - The Arrested Israeli Suspects Right - Shalon Left - Orenstein in Israeli Court Today 22/7/15 - Ynet

В США и Израиле задержаны четверо подозреваемых в атаке на JPMorgan Chase

In the United States and Israel arrested four suspects in the attack on the JPMorgan Chase

Израильтян, подозреваемых во взломе системы банка JPMorgan Chase, требуют посадить на 20 лет
Американская прокуратура требует приговорить израильтян Гари Шалона и Зива Орнштейна, обвиняемых в США в причастности к взлому крупнейшего американского банка JPMorgan Chase и ряда других финансовых учреждений, к тюремному заключению сроком на 20 лет, сообщает The Marker.Ранее в среду мировой суд Иерусалима продлил задержание обоих подозреваемых на 20 дней, пока суд продолжает рассматривать требование об их экстрадиции со стороны США.Всего американские и израильские спецслужбы задержали четверых подозреваемых – двух в Израиле и двух во Флориде. Пятый подозреваемый, по сообщениям СМИ, находится в России, у которой нет с США договора об экстрадиции.Отметим, что до этого СМИ сообщали о задержании трех израильтян, однако эти сведения оказались ошибочными.Как сообщалось ранее, в течение нескольких месяцев ФБР вело скрытое наблюдение за группой друзей, учившихся десять лет назад в Университете Флориды. По данным ФБР, именно они, бывшие университетские друзья, стоят за одной из крупнейших хакерских атак.Отметим, что на начальном этапе расследования ФБР склонялось к тому, что взлом был осуществлен группой российских хакеров. Не исключалось, что данное кибернападение было ответом на экономические санкции, введенные Вашингтоном против России.Взлом серверов банка JPMorgan Chase был замечен в августе 2014 года, и, как выяснилось позднее, он был следствием кражи пользовательских данных одного из сотрудников банка. В ходе расследования выяснилось, что для входа в систему используется двухфакторная аутентификация: для логина кроме пароля требуется ввести одноразовый проверочный код. Однако по неизвестной причине на одном из серверов двойную аутентификацию не ввели, что привело к проникновению хакеров в сеть и получение доступа к более чем 90 серверам.

5 Men, 2 Fraud Schemes and a Possible Link to JPMorgan Chase Hacking

By MATTHEW GOLDSTEINJULY 23, 2015 – New York Times

Last Saturday, Anthony R. Murgio attended a college friend’s wedding in Atlanta, seemingly without a care in the world.

Yet the day before, unbeknown to Mr. Murgio, federal prosecutors in Manhattan had filed two criminal complaints, under seal, that accused him and another former college classmate, Yuri Lebedev, of running an illegal Bitcoin money exchange operation that enabled criminals operating online to convert the digital currency to cash.

Both men were arrested at their homes in Florida Tuesday morning. That same day, the authorities in Israel seized two other men, who were charged with running a multiyear stock manipulation scheme. A third man was indicted but not arrested because he was not at his home in Israel.

The two cases — which on the surface appear unrelated — are the first tantalizing clues to a long-running federal investigation into the huge hacking of JPMorgan Chase’s vast network last summer. That breach compromised some personal contact information for 83 million customer accounts. Federal authorities have suspected for months that some of the people arrested this week had a role in helping to carry out the attack, but have yet to officially link any of them to it.

At least three of the people charged apparently knew one another for at least a decade, going back to when they were students at Florida State University. While their potential connection to the JPMorgan attack is unclear, two of those charged were identified last fall by the Federal Bureau of Investigation as having some link to the attack on the bank, people who were briefed on the matter said.

One of those people said tens of millions of customers’ email addresses and phone numbers stolen from the bank may have been used as part of a subsequent stock manipulation scheme in which the accused would send spam emails promoting worthless stocks. The person said it was possible the actual hacking was done by others in Eastern Europe on the instructions of those overseeing the stock pump-and-dump scheme.

While many questions remain, what is clear is that federal authorities were forced to move much sooner than they had wanted, partly out of concern that the investigation was becoming too public and that some of those charged might try to move to countries with no formal extradition process to the United States.

On July 2, federal prosecutors sent a letter to Israeli authorities asking them to arrest three men charged with running a four-year stock manipulation scheme as soon as one of the men returned home to Tel Aviv from a trip outside the country. Prosecutors said they were concerned about news organizations making public some aspects of the investigation.

In the letter, the prosecutors said a United States judge had issued arrest warrants for the men on June 2, after a federal grand jury in Manhattan indicted the three on 11 counts of securities fraud in a sealed indictment. The letter from the Justice Department’s Office of International Affairs included photographs of the three men and brief physical descriptions.

On Tuesday, two of the men, Gery Shalon and Ziv Orenstein, were arrested at home in Israel when prosecutors in Manhattan asked a federal judge to have the indictment made public.

The third, Joshua Samuel Aaron, was not arrested because he remained abroad and did not return to Israel by the middle of the month as federal prosecutors had expected. The authorities suspect Mr. Aaron may be in Russia, judging by photographs posted several weeks ago by his wife, Alona Chaim Aaron, on several social media accounts.

The letter asking Israel to assist with the arrests was made public during a court proceeding for Mr. Shalon, 31, and Mr. Orenstein, 41. An Israeli judge ordered both of them to remain in custody pending a hearing on Aug. 10. Mr. Aaron, 31, who was born in the United States and grew up in Maryland, lives in Tel Aviv.

In the letter to Israeli authorities, federal prosecutors said that in the past “Shalon caused the massive quantity of spam emails to be transmitted through his and Aaron’s control of numerous servers, domain names, email accounts and accounts with third-party email distribution companies under Shalon’s control.”

Federal prosecutors said they would seek to extradite the Israeli defendants for trial in Manhattan.

In the United States, Mr. Lebedev, who lives in a town near Jacksonville, was released on Tuesday after posting a $25,000 bond. Mr. Murgio remained in custody late Thursday at the Pinellas County Jail in Clearwater, having failed to post a $100,000 bond.

Mark Barnett, a lawyer for Mr. Lebedev, declined to comment. Adam Schwartz, a lawyer for Mr. Murgio, did not return a call seeking comment.

Mr. Murgio, Mr. Aaron and Mr. Lebedev were all students at Florida State University.

In 2008, Mr. Murgio and Mr. Aaron formed a business in West Palm Beach, Fla., called Health Universe L.L.C. It closed about a year later. Mr. Lebedev, 37, who graduated from Florida State with degrees in computer science and mathematics in 2004 and 2008, lists himself as a software architect for company led by Mr. Murgio’s brother.

Mr. Murgio, 31, who graduated with a degree in marketing in 2007, had run a number of failed restaurant businesses and other ventures. In 2012, then living in Tallahassee, Mr. Murgio filed for bankruptcy, claiming he had $545,000 in debts.

Mr. Aaron, who majored in real estate, left Florida State in 2005 without a degree, a university spokesman said. For a time he ran a small business called Josh Aaron L.L.C. out of his parents’ home in Potomac, Md., before moving to Israel.

Federal prosecutors contend that Mr. Murgio and Mr. Lebedev went into the Bitcoin money exchange business in 2013, providing a platform for criminals who put malicious malware on computers and then demand a ransom payment in Bitcoin to unfreeze those computers.

The prosecutors said Mr. Murgio and Mr. Lebedev sought to conceal their money transfer activities by taking effective control of a small credit union in New Jersey that mainly served low-income members.

They did not identify the credit union, but people briefed on the matter said it is Helping Other People Excel Federal Credit Union in Jackson, N.J. Charles E. Blue Sr., the credit union’s chief executive, said, “We cannot comment on ongoing investigations.”

It is not clear how Mr. Aaron became associated with Mr. Shalon and Mr. Orenstein. Federal authorities contend that the men began orchestrating so-called pump-and-dump penny stock schemes in 2011.

In pump-and-dumps, promoters drive up the price of worthless stocks and pitch them to unsuspecting investors. The organizers then sell the shares before the price crashes.

In an odd twist, Mr. Aaron’s elderly grandparents in Maryland were almost victims of fraud in 2012. Late that year, a person called up pretending to be a relative and demanding money. In this case, the caller claimed to be Mr. Aaron and said he was in jail in Greece and needed $3,500.

It’s a familiar ruse that consumer advocates have called the “grandparent scam.” But Mr. Aaron’s grandparents knew that the caller was not their grandson and that the story was a hoax. The couple reported it to consumer affairs officials in Montgomery County, Md. At the time, the attempted fraud drew some media coverage about the danger of such swindles.

Posted by Boaz Guttman בועז גוטמן ГУТМАН on 2015-07-22 10:32:16

Tagged: , JPMorgan , Bank , Hacking , Israelis , FBI , SEC

bitter.io - Free bitcoin, bitcoin advertising, ptc

Related posts