Court enters $19M judgment against JPMorgan hacker
About a month after Russian hacker Andrei Tyurin, who targeted companies such as JPMorgan and E*Trade, was sentenced to 144 months in prison, the Court has entered another order regarding the monetary penalties in this case. According to an order signed by Judge Laura Taylor Swain of the New York Southern District Court on February 5, 2021, and made available to FX News Group today, a money judgment in the amount of $19,214,956.00 is entered against Tyurin.
The sum represents the amount of proceeds traceable to the offenses charged in in Counts One, Two, Eight, and Nine of the First Indictment and Counts One and Five of the Second Indictment that Tyurin personally obtained. Regarding this money, Tyurin is jointly and severally liable with co-defendants Joshua Samuel Aaron, Ziv Orenstein, and Gery Shalon.
On January 7, 2021, Andrei Tyurin was sentenced in Manhattan federal court to 144 months in prison for computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies.
From approximately 2012 to mid-2015, Tyurin engaged in an extensive computer hacking campaign targeting financial institutions, brokerage firms, and financial news publishers in the U.S. and was responsible for the theft of personal information of over 100 million customers of the victim companies. His hack of J.P. Morgan Chase Bank alone resulted in the theft of personal information of over 80 million customers.
In addition to the U.S. financial sector hacks, from approximately 2007 to mid-2015 Tyurin also conducted cyberattacks against numerous U.S. and foreign companies in furtherance of various criminal enterprises, including unlawful internet gambling businesses and international payment processors.
Tyurin’s hacking activity included the targeting of companies known to be used for email marketing campaigns, competitor online casinos, and a merchant risk intelligence firm based in the United States, in order for the co-conspirators to monitor the firm’s efforts to audit potentially criminal online credit card transactions on behalf of major credit card networks, and thus avoid detection of their own criminal schemes.
The hacker used computer infrastructure located across five continents, which he controlled from his home in Moscow, and maintained persistent access over extended periods of time to the victims’ networks, regularly refreshing the stolen data by repeatedly downloading information from these companies.