Three charged with distributing Gozi virus

The defendants face a variety of charges in a U.S. court

Three people allegedly involved for years in cybercriminal activities in Eastern Europe have been charged in a U.S. court for creating and distributing the Gozi virus that infected more than 1 million computers and allowed cybercriminals to steal millions of dollars over a five-year period.

The three defendants, Nikita Kuzmin of Russia, Mihai Ionut Paunescu of Romania, and Deniss Calovskis of Latvia, face a variety of charges in U.S. District Court for the Southern District of New York, the U.S. Department of Justice announced Wednesday. Gozi targeted online banking credentials and other online accounts and infected 40,000 computers in the U.S., including 160 at NASA, the U.S. space agency.

Kuzmin, the alleged chief architect and promoter of Gozi, faces charges of bank fraud and conspiracy, access device fraud and conspiracy, and computer intrusion, among other charges. Kuzmin allegedly began working on Gozi in 2005, and computer security experts discovered the threat in 2007, according to court documents.

Paunescu, who allegedly provided secure hosting to the creators of Gozi, the Zeus Trojan and the SpyEye Trojan, faces charges of conspiracy to commit computer intrusion, conspiracy to commit bank fraud and conspiracy to commit wire fraud.

Calovskis, who allegedly developed Web injects code for both Gozi and Zeus, faces charges of bank fraud conspiracy, access device fraud conspiracy and conspiracy to commit computer intrusion, among other charges.

Early in the development of the virus, Kuzmin hired a computer programmer to help him develop Gozi, which stole personal bank and other information from computers while remaining virtually undetectable, according to court documents. In 2006, Kuzmin allegedly began offering the virus to others for a weekly fee, his indictment said.

The stolen data was sent back to a server controlled by Kuzmin, the DOJ alleged. In 2009, a group of cybercriminals asked Kuzmin to sell them the source code of Gozi so they could attack U.S. computers, the DOJ said. Kuzmin sold the source code to several co-conspirators through mid-2010, according to court documents.

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is

Join the CSO newsletter!

Error: Please check your email address.

Tags U.S. Department of JusticeNikita KuzminMihai Ionut PaunescusecurityDeniss CalovskislegalExploits / vulnerabilitiesmalwarecybercrimeU.S. District Court for the Southern District of New York

More about Department of JusticeDOJIDGNASA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Grant Gross

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts