COURT DOC: Russian Hacker Who Used NeverQuest Malware To Steal Money From Victims’ Bank Accounts Sentenced In Manhattan Federal Court To Four Years In Prison
Geoffrey S. Berman, the United States Attorney for the Southern District of New York, announced that STANISLAV VITALIYEVICH LISOV, a/k/a ‘Black,’ a/k/a ‘Blackf’ (‘LISOV’), was sentenced to 48 months in prison today for conspiring to deploy and use a type of malicious software known as NeverQuest to infect the computers of unwitting victims, steal their login information for online banking accounts, and use that information to steal money out of the victims’ accounts. NeverQuest has been responsible for millions of dollars worth of attempts by hackers to steal money out of victims’ bank accounts.
NeverQuest is a type of malicious software, or malware, known as a banking Trojan. It can be introduced to victims computers through social media websites, phishing emails, or file transfers. Once surreptitiously installed on a victims computer, NeverQuest is able to identify when a victim attempted to log onto an online banking website and transfer the victims login credentials including his or her username and password back to a computer server used to administer the NeverQuest malware. Once surreptitiously installed, NeverQuest enables its administrators remotely to control a victims computer and log into the victims online banking or other financial accounts, transfer money to other accounts, change login credentials, write online checks, and purchase goods from online vendors.
Between June 2012 and January 2015, LISOV was responsible for key aspects of the creation and administration of a network of victim computers known as a ‘botnet’ that was infected with NeverQuest. Among other things, LISOV maintained infrastructure for this criminal enterprise, including by renting and paying for computer servers used to manage the botnet that had been compromised by NeverQuest. Those computer servers contained lists with approximately 1.7 million stolen login credentials including usernames, passwords, and security questions and answers for victims accounts on banking and other financial websites. LISOV had administrative-level access to those computer servers.
LISOV also personally harvested login information from unwitting victims of NeverQuest malware, including usernames, passwords, and security questions and answers. In addition, LISOV discussed trafficking in stolen login information and personally identifying information of victims. (Source: U.S. Department of Justice)