Tag Archives: pavel vrublevsky

Who Is the ‘Festi’ Botmaster?

June 13, 2012

Pavel Vrublevsky, the co-founder of Russian payment processor ChronoPay, is set to appear before a judge this week in a criminal case in which he is accused of hiring a botmaster to attack a competitor. Prosecutors believe that the man Vrublevsky hired in that attack was the curator of the Festi botnet, a spam-spewing machine that also has been implicated in a number of high-profile denial-of-service assaults.

Gateline.net Was Key Rogue Pharma Processor

April 3, 2012

It was mid November 2011. I was shivering on the upper deck of an aging cruise ship docked at the harbor in downtown Rotterdam. Inside, a big-band was jamming at a reception for attendees of the GovCert cybersecurity conference, where I had delivered a presentation earlier that day on a long-running turf war between two of the largest sponsors of spam.

The evening was bracingly frigid and blustery, and I was waiting there to be introduced to investigators from the Russian Federal Security Service; several FSB agents who attended the conference told our Dutch hosts that they wanted to meet me in a private setting. Stepping out the night air, a woman from the conference approached, formally presented the three men behind her, and then hurried back inside to the warmth of the reception

Jailed ChronoPay Co-Founder Denied Bail

November 1, 2011

A Moscow court on Monday denied bail for Pavel Vrublevsky, a Russian businessman who was charged earlier this year with hiring hackers to launch costly online attacks against his rivals. The denial came even after Vrublevsky apparently admitted his role… Read More »

Pharma Wars: Paying for Prosecution

September 12, 2011

In June 2011, Russian authorities arrested Pavel Vrublevsky, co-founder of ChronoPay, Russia’s largest processor of online payments, for allegedly hiring a hacker to attack his company’s rivals. New evidence suggests that Vrublevsky’s arrest was the product of a bribe paid… Read More »

Pharma Wars: Purchasing Protection

August 30, 2011

Leaked online chats between the co-owners of the world’s largest pharmacy spam operation reveal the extent to which illicit organizations in Russia purchase political protection, and bribe public officials into initiating or stalling law enforcement investigations.

Pharma Wars, Part II

August 19, 2011

Earlier this year, Russian police arrested Dmitry Stupin, a man known in hacker circles as “SaintD.” Stupin was long rumored to be the right-hand man of Igor Gusev, the alleged proprietor of GlavMed and SpamIt, two shadowy sister organizations that until this time last year were the largest sources of spam touting rogue Internet pharmacies.

According to several sources who are familiar with the matter, Russian police pulled Stupin off of a plane before it left Moscow. The police also reportedly took Stupin’s MacBook and copied its contents. The police detained Stupin as part of an investigation into Gusev launched nearly a year ago. Gusev fled his native Moscow last year and has not returned.

Sometime in the past few days, more than four years’ worth of chat conversations — apparently between Stupin, Gusev and dozens of other GlavMed employees — were leaked. Those conversations offer a fascinating glimpse into the day-to-day operations one of the world’s largest organization cyber criminal organizations.

Fake Antivirus Industry Down, But Not Out

August 3, 2011

A majority of the largest fake AV affiliate programs that pay hackers to foist junk security software have closed up shop in recent weeks. The wave of closures comes amid heightened scrutiny of the industry from security experts and a host of international law enforcement officials.

Over the past several weeks, many of the Web sites for the top fake AV promotion programs disappeared or complained of difficulty in processing credit card transactions for would-be scwareware victims: Fake AV brands such as Gagarincash, Best AV, Blacksoftware.cc and a Sevantivir.com ceased operating or alerted peddlers who were hired to install these programs that they might not get paid for current and future installations.