Swede gets 4 years for processing scareware payments

  • Liam Tung (CSO Online)
  • — 20 December, 2012 10:29

p> A Swedish businessman has been sentenced to four years in prison for knowingly processing payments for a multimillion dollar scareware operation that authorities crippled last year.

Mikael Patrick Sallnert was arrested in January 2012 in Denmark and extradited to the US this March to face fraud charges for his role in one scareware scam that swept from 2008, netting $71 million from an estimated 960,000 victims.

In his plea agreement Sallnert said he had agreed to establish and operate a payments processing facility with the knowledge his clients were operating a scareware ring which defrauded victims.

His company, which the Justice Department described as the “backbone” to scareware rings, processed $5 million in credit card payments for the gang between 2008 and 2009. In addition to the sentence, Sallnert was ordered to pay $650,000 in forfeiture. 

Sallnert was prosecuted as part of Operation Trident Tribunal, which disrupted two scareware groups last year that operated across the US and Europe ahead of his arrest.   

In June 2011, the Justice Department announced the arrest of two Latvian citizens who were accused of buying ad space with an online newspaper in the US and swapping out non-harmful ads that the paper’s staff checked with malicious ads that caused targets computers to freeze and pushed fake antivirus upon victims.

The department did not announce any arrests for the other operation, which netted scareware victims by presenting fake security scans. Latvian authorities did however seize five bank accounts alleged to have been use to funnel profits to the scam’s “leadership”.

Operation Trident Tribunal is an ongoing cybercrime investigation, the department said.

The Federal Trade Commission in October this year won a ruling against the heads of another scareware operation. Kristy Ross, Sam Jain and another Swede, Daniel Sundin, were held liable for $163 million in redress to consumers who had been victims of their scareware campaign.


 

Tags: Scareware, security

Coding error protects some Android apps from Heartbleed

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.