Monthly Archives: February 2015

The FBI’s Most Wanted Cyber Crook Has A $3 Million Price On His Head

On Tuesday, the U.S. government announced that it is offering a reward of up to $3 million for information leading to the arrest of one of the FBI’s most wanted cyber crooks–the Russian man behind GameOver Zeus and Cryptolocker. The announcement of the reward, which is being offered through the State Department’s Transnational Organized Crime Rewards Program, comes eight months after the FBI took down the both GameOver Zeus and Cryptolocker in June 2014.

Evgeniy Mikhailovich Bogachev, 30, currently tops the FBI’s Cyber Most Wanted list for his alleged involvement in running a global botnet (or network of hacked computers) known as GameOver Zeus. Starting in September 2011, GameOver Zeus was used to steal banking credentials from infected computers and add those computers to its global network. GameOver Zeus is believed to have infected more than 1 million computers with malware, leading to the theft of more than $100 million from businesses and consumers around the world. In addition, Bogochev was also allegedly

Read more at: http://www.forbes.com/sites/katevinton/2015/02/24/the-fbis-most-wanted-cyber-crook-has-a-3-million-price-on-his-head/

DOJ offers $3 million reward for Gameover Zeus botnet suspect

Two U.S. government agencies are offering a US$3 million reward for information leading to the arrest or conviction of a Russian man suspected of having served as an administrator for the destructive Gameover Zeus botnet.

The U.S. Department of Justice and the Department of State’s Transnational Organized Crime Rewards Program announced the reward for information about suspect Evgeniy Mikhailovich Bogachev on Tuesday. Bogachev is charged in the U.S. with several crimes related to Gameover Zeus, which targeted banking credentials and other personal information over a two-year period.

Gameover Zeus was responsible for more than 1 million computer infections, resulting in financial losses of more than $100 million, the DOJ said in a press release. The DOJ, working with law enforcement agencies from other countries, disrupted the botnet in mid-2014.