The U.S. authorities this week put a $10 million bounty on a Russian man who for the previous 18 years operated Try2Check, one of many cybercrime underground’s most trusted companies for checking the validity of stolen bank card information. U.S. authorities say 43-year-old Denis Kulkov‘s card-checking service made him at the least $18 million, which he used to purchase a Ferrari, Land Rover, and different luxurious gadgets.
Launched in 2005, Try2Check quickly was processing greater than one million card-checking transactions per 30 days — charging 20 cents per transaction. Cybercriminals turned to companies like this after buying stolen bank card information from an underground store, with an eye fixed towards minimizing the variety of playing cards which are inactive by the point they’re put to prison use.
Try2Check was so dependable that it will definitely grew to become the official card-checking service for among the underground’s most bustling crime bazaars, together with Vault Market, Unicc, and Joker’s Stash. Customers of those carding outlets who selected to make use of the store’s built-in (however a-la-carte) card checking service from Try2Check may count on computerized refunds on any playing cards that have been discovered to be inactive or canceled on the time of buy.
Many established stolen card outlets will enable prospects to request refunds on lifeless playing cards primarily based on official reviews from trusted third-party checking companies. But usually, the larger outlets have steered prospects towards utilizing their very own white-labeled model of the Try2Check service — primarily to assist reduce disputes over canceled playing cards.
On Wednesday, May 3, Try2Check’s web sites have been changed with a site seizure discover from the U.S. Secret Service and U.S. Department of Justice, as prosecutors within the Eastern District of New York unsealed an indictment and search warrant naming Denis Gennadievich Kulkov of Samara, Russia because the proprietor.
At the identical time, the U.S. Department of State issued a $10 million reward for info resulting in the arrest or conviction of Kulkov. In November 2021, the State Department started providing as much as to $10 million for the title or location of any key leaders of REvil, a serious Russian ransomware gang.
As famous within the Secret Service’s prison grievance (PDF), the Try2Check service was first marketed on the closely-guarded Russian cybercrime discussion board Mazafaka, by somebody utilizing the deal with “KreenJo.” That deal with used the identical ICQ on the spot messenger account quantity (555724) as a Mazafaka denizen named “Nordex.”
In February 2005, Nordex posted to Mazafaka that he was available in the market for hacked financial institution accounts, and supplied 50 % of the take. He requested companions to contact him on the ICQ quantity 228427661 or on the electronic mail deal with polkas@bk.ru. As the federal government famous in its search warrant, Nordex exchanged messages with discussion board customers on the time figuring out himself as a then-24-year-old “Denis” from Samara, RU.
In 2017, U.S. legislation enforcement seized the cryptocurrency alternate BTC-e, and the Secret Service mentioned these data present {that a} Denis Kulkov from Samara equipped the username “Nordexin,” electronic mail deal with nordexin@ya.ru, and an deal with in Samara.
Investigators had already discovered Instagram accounts the place Kulkov posted footage of his Ferrari and his household. Authorities have been capable of determine that Kulkov had an iCloud account tied to the deal with nordexin@icloud.com, and upon subpoenaing that discovered passport images of Kulkov, and effectively as extra images of his household and dear automobiles.
Like many different prime cybercriminals primarily based in Russia or in international locations with favorable relations to the Kremlin, the proprietor of Try2Check was not notably tough to hyperlink to a real-life identification. In Kulkov’s case, it little question was important to U.S. investigators that that they had entry to a wealth of non-public info tied to a cryptocurrency alternate Kulkov had used.
However, the hyperlink between Kulkov and Try2Check may be made — paradoxically — primarily based on data which were plundered by hackers and printed on-line over time — together with Russian electronic mail companies, Russian authorities data, and hacked cybercrime boards.
NORDEX
According to cybersecurity agency Constella Intelligence, the deal with polkas@bk.ru was used to register an account with the username “Nordex” at bankir[.]com, a now defunct information web site that was nearly customary studying for Russian audio system fascinated by information about varied Russian monetary markets.
Nordex seems to have been a finance nerd. In his early days on the boards, Nordex posted a number of lengthy threads on his views in regards to the Russian inventory market and mutual fund investments.
That Bankir account was registered from the Internet deal with 193.27.237.66 in Samara, Russia, and included Nordex’s date of start as April 8, 1980, in addition to their ICQ quantity (228427661).
Cyber intelligence agency Intel 471 discovered that Internet deal with additionally was used to register the account “Nordex” on the Russian hacking discussion board Exploit again in 2006.
Constella tracked one other Bankir[.]com account created from that very same Internet deal with below the username “Polkas.” This account had the identical date of start as Nordex, however a distinct electronic mail deal with: nordia@yandex.ru. This and different “nordia@” emails shared a password: “anna59.”
NORDIA
Nordia@yandex.ru shares a number of passwords with nordia@checklist.ru, which Constella says was used to create an account at a spiritual web site for an Anna Kulikova from Samara. At the Russian house furnishing retailer Westwing.ru, Ms. Kulikova listed her full title as Anna Vnrhoturkina Kulikova, and her deal with as 29 Kommunistrecheskya St., Apt. 110.
A search on that deal with in Constella brings up a file for an Anna Denis Vnrhoturkina Kulkov, and the cellphone quantity 879608229389.
Russian automobile registration data have additionally been hacked and leaked on-line over time. Those data present that Anna’s Apt 110 deal with is tied to a Denis Gennadyvich Kulkov, born April 8, 1980.
The automobile Kolkov registered in 2015 at that deal with was a 2010 Ferrari Italia, with the license plate quantity K022YB190. The cellphone quantity related to this file — 79608229389 — is precisely like Anna’s, solely minus the (mis?)main “8”. That quantity is also tied to a now-defunct Facebook account, and to the e-mail addresses nordexin@ya.ru and nordexin@icloud.com.
Kulkov’s Ferrari has been photographed quite a few instances over time by Russian automobile aficionados, together with this one with the driving force’s face redacted by the photographer:
As the title of this story suggests, the laborious half for Western legislation enforcement isn’t figuring out the Russian cybercriminals who’re main gamers within the scene. Rather, it’s discovering artistic methods to seize high-value suspects if and after they do go away the safety that Russia usually extends to home cybercriminals inside its borders who don’t additionally hurt Russian firms or shoppers, or intrude with state pursuits.
But Russia’s conflict in opposition to Ukraine has brought about main fault strains to seem within the cybercrime underground: Cybercriminal syndicates that beforehand straddled Russia and Ukraine with ease have been pressured to reevaluate many comrades who have been abruptly working for The Other Side.
Many cybercriminals who operated with impunity from Russia and Ukraine previous to the conflict selected to flee these international locations following the invasion, presenting worldwide legislation enforcement businesses with uncommon alternatives to catch most-wanted cybercrooks. One of these was Mark Sokolovsky, a 26-year-old Ukrainian man who operated the favored “Raccoon” malware-as-a-service providing; Sokolovsky was apprehended in March 2022 after fleeing Ukraine’s obligatory navy service orders.
Also nabbed on the lam final yr was Vyacheslav “Tank” Penchukov, a senior Ukrainian member of a transnational cybercrime group that stole tens of hundreds of thousands of {dollars} over practically a decade from numerous hacked companies. Penchukov was arrested after leaving Ukraine to fulfill up along with his spouse in Switzerland.