Five Arrested in JPMorgan Hacking Case

fbi-540x334.jpg?1437331408

US law enforcement officials have arrested five individuals who reportedly were involved in the high-profile 2014 computer hacking of JPMorgan.

Three of the individuals were arrested for stock manipulation while the other two were arrested for running an illegal Bitcoin exchange, according to the FBI. Grand jury indictments unsealed for each don't mention the JPMorgan attacks, but sources told both the Wall Street Journal and Bloomberg that all five individuals are people of interest in the FBI's investigation of the JPMorgan attack.

The perpetrators of that attack stole the login credentials of a JPMorgan employee and used it to access 90 of the company's servers.

They subsequently stole details including names, email addresses and phone numbers for about 76 million households and 7 million businesses. No financial information was compromised, according to JPMorgan, though the attackers accessed multiple systems.

The attackers also penetrated the systems of other banks, according to reports. Initially, JPMorgan suspected the Russian government was involved, though subsequent investigations had ruled out the possibility.
In the stock manipulation case, Israeli citizens Gery Shalon and Ziv Orenstein were apprehended, along with US citizen Joshua Samuel Aaron, the FBI said.

Their scheme was a classic pump-and-dump operation, involving artificially raising the value of low-volume stocks and then selling them at an inflated price to unwary buyers attracted through spam e-mail, according to court documents. The operation took place in 2011 and 2012.

Separately, Yuri Lebedev and Anthony Murgio were also arrested for operating an unlicensed Bitcoin exchange, Coin.mx, which traded more than $1.8 million worth of Bitcoin on behalf of tens of thousands of clients, in violation of federal anti-money-laundering laws.

Compuetrworld: http://bit.ly/1elrpap

 

« Cyber-security Startup Darktrace Valued at More Than £60m
UK Government £1m scheme for SMEs to Fight Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.