Base de données Jurisprudence

Cybercriminalité

Actes contre la confidentialité , l'intégrité et la disponibilité des données informatiques , et des systèmes

• Accès illégal à un système informatique
• Accès illégal à des données informatiques
• Production/ diffusion/ possession d’outils informatiques malveillants
• Atteinte à l’intégrité des données ou d’un système

Actes relatifs à l'informatique pour le gain personnel ou financier

• Fraude

Participation à un groupe organisé

Organized cybercrime case 2004

Résumé des faits

An organized criminal group consisting of Russian and Kazakh nationals extorted money from foreign companies between 2003 and 2004. The suspects attacked servers of the corporate victims and demanded the payment of thousands of US dollars in return for stopping attacking such servers.

The suspects infected several computers by using malware unbeknown to the computers' owners. Such malware allowed the suspects to create a network of infected computers from which they were able to launch distributed denials of service (DDoS) attacks. A DDoS attack entails the simultaneous sending of a large number of requests to a computer server. When the number of requests exceeds the server's capacity, the server stops working.

The criminal group had an organized structure. A.A.P. was in charge of handling the network of infected computers and making it available when the group wanted to launch a DDoS attack. I.V. was in charge of writing malware intended to launch DDoS attacks, with a special function that enabled the suspects to gain control over the infected computer by exploiting a weakness of Windows.

The suspects used a number of techniques to conceal their illegal activities. They used various anonymous proxy servers and virtual private network (VPN) services as well as various anonymous mail servers in order to conceal or change their real IP addresses. They also used fake names to create new email accounts.

The members of the criminal organization developed a strategy to transfer the money extorted from the companies they attacked, using existing international payment networks such as Western Union, Webmoney and Avtobank-Nikoil. To avoid disclosing their identities, the suspects requested the corporate victims to send the payments to individuals residing in the Republic of Latvia. Such individuals subsequently transferred the funds to the Russian Federation.
One of the corporate victims refused to pay and reported the facts to law enforcement. This report triggered the investigation that led to the arrest of the suspects.

Questions transversales

Responsabilité

Responsabilité pour

• Infraction consommée

Responsabilité fondée sur

• Intention criminelle

Responsabilité impliquant

• Auteur principal (d’une infraction)

Commission d’une infraction

Détails

• Impliqué dans un groupe criminel organisé (Article 2(a) CTOC)
• Produite dans un (ou plusieurs) des frontières internationales (transnational)

Pays concernés

Fédération de Russie

enquête

Organismes concernés

• United Kingdom National Hi-Tech Crime Unit (NHTCU, later the Serious Organized Crime Agency — SOCA)
• United States Secret Service
• Investigative Committee of the Ministry of Internal Affairs of the Russian Federation
• Directorate K of the Ministry of Internal Affairs of the Russian Federation

Observations

The Investigative Committee of the Ministry of Internal Affairs of the Russian Federation, Directorate K of the Ministry of Internal Affairs of the Russian Federation and officials from United Kingdom and United States law-enforcement authorities (the server used to infect the victims' computers was located in US territory) conducted an unprecedented investigation which culminated in the conviction of the blackmailers, who were residents of the Russian Federation.

 

Coopération internationale

Pays concernés

États-Unis d'Amérique

Royaume-Uni de Grande-Bretagne et d'Irlande du Nord

Mesures

• Enquêtes conjointes

Résumé

In 2004, the Investigative Committee of the Ministry of Internal Affairs of the Russian Federationa, upon request of British authorities, launched an investigation into extortion threats by individuals residing in the Russian territory against a number of British companies.

 

Informations sur la procédure

Système juridique:
Droit civil
 

Défendeurs / Répondants de la première instance

Prévenu:
I.V.M.
Sexe:
Homme
Prévenu:
A.A.P.
Sexe:
Homme
Prévenu:
D.V.S.
Sexe:
Homme

Accusations / Demandes d’indemnité / Décisions

Prévenu:
I.V.M.
Charge:
Extortion
Statut:
Criminal Code of the Russian Federation (as amended by Federal Law No. 111 of 7 July 2003)Article 163, paragraph 3, subparagraphs (a) and (b)
Verdict:
Guilty
Peine de prison:
8 ans
Amende / Paiement à l’État:
Oui  100000  roubles 
Prévenu:
A.A.P.
Charge:
Extortion
Statut:
Criminal Code of the Russian Federation (as amended by Federal Law No. 162 of 8 December 2003)Article 163, paragraph 3, subparagraphs (a) and (b)
Verdict:
Guilty
Peine de prison:
8 ans
Amende / Paiement à l’État:
Oui  100000  roubles 
Prévenu:
D.V.S.
Charge:
Extortion
Statut:
Criminal Code of the Russian Federation (as amended by Federal Law No. 162 of 8 December 2003)Article 163, paragraph 3, subparagraphs (a) and (b)
Verdict:
Guilty
Peine de prison:
8 ans
Amende / Paiement à l’État:
Oui  100000  roubles 

Sources / citations

UNODC