Aleksei Burkov was extradited from Israel to the US in 2019.
Hackread.com previously reported about a Russian computer hacker and cyber criminal Aleksei Burkov who was arrested for facilitating credit card fraud worth $20 million and running a well-organized clearinghouse to provide a safe environment for international cybercriminals to operate.
Charges against Burkov were filed in 2015, and he was arrested in Israel the same year. The scammer was extradited to the US after spending several years in jail while the Russian government resisted his extradition. However, Burkov filed an extradition request and was sent to the US in November 2019.
We have been following this case ever since, and as per the latest reports, the 30-year old scammer has been sentenced [108 pages judgment in PDF] to nine years in prison including the time he’s already served. This means the Burkov will spend around four and a half years more in prison.
Burkov pleaded guilty to wire and access device fraud, identity theft, money laundering, and conspiring to commit computer invasion on January 23rd, 2020.
He admitted running two cybercriminal web forums, one of which he used to facilitate the $20m credit card fraud and the second one served as an ‘invite-only’ forum for ‘elite cybercriminals’ where they could share stolen data and access hacking resources.
Prosecutors claim that Burkov from St. Petersburg, Russia, carved a new niche in cybercrime domain through his Direct Connection website, which was active between 2009 and 2015. The website served as an ‘exclusive’ forum for criminals on the web.
The participants of his forum had to provide a $5,000 bond and have three current members of the forum vouch for them. After joining the forum, members could exchange stolen credit card numbers, malware, and other hacking resources, and join hands with other cybercriminals to launch nefarious scams. Burkov also mediated to resolve conflicts between members.
Burkov ran another website called Card Planet where he sold stolen credit-card numbers for as low as $3 up to $60. A majority of the data was stolen from US-based financial services and over 150,000 numbers were offered for sale at the website with an exclusive money-back guarantee if any of the numbers didn’t work.