person in black hoodie wearing white mask


Two Eastern European men were sentenced for providing “bulletproof hosting” services, which were used by cybercriminals between 2009 to 2015 to distribute malware and attack financial institutions and victims throughout the United States.

brown mallet on gray wooden surfaceOn June 28 and Oct. 20,  U.S. District Court Judge Denise Page Hood sentenced Pavel Stassi, 30, of Estonia, to 24 months in prison; and Aleksandr Skorodumov, 33, of Lithuania, to 48 months in prison, for their roles in the scheme.

According to court documents, Stassi and Skorodumov were members of a bulletproof hosting organization founded and led by two co-defendants, Aleksandr Grichishkin and Andrei Skvortsov, both 34 and of Russia.

The group rented IP addresses, servers, and domains to cybercriminal clients who employed this technical infrastructure to disseminate malware used to gain access to victims’ computers, form botnets, and steal banking credentials for use in frauds.

Malware hosted by the organization included Zeus, SpyEye, Citadel, and the Blackhole Exploit Kit, which attacked U.S. companies and financial institutions between 2009 and 2015 and caused or attempted to cause millions of dollars in losses to U.S. victims.

The defendants also helped their clients evade detection by law enforcement and continue their crimes uninterrupted by monitoring sites used to blocklist technical infrastructure used for crime, moving “flagged” content to new infrastructure, and registering all such infrastructure under false or stolen identities.

“Given their international nature, and the anonymity of the internet, cybercrime investigations often take years,” said Acting U.S. Attorney Saima Mohsin for the Eastern District of Michigan. “They require the resources of multiple law enforcement agencies, the cooperation of multiple governments, skilled interpreters, and time-consuming extradition procedures. The persistence and hard work of our law enforcement partners has led to these successful prosecutions and sends a message to cybercriminals that they will be brought to justice.”

According to court filings and statements made in connection with the defendants’ guilty pleas, Skorodumov was one of the organization’s lead systems administrators and, at some points, its only systems administrator. In this role, he configured and managed the clients’ domains and IP addresses, provided technical assistance to help clients optimize their malware and botnets, and monitored and responded to abuse notices.

Stassi undertook various administrative tasks for the organization, including conducting and tracking online marketing to the organization’s criminal clientele and using stolen and/or false personal information to register webhosting and financial accounts used by the organization.

Stassi, Skorodumov, Grichishkin and Skvortsov each pleaded guilty to one count of Racketeer Influenced and Corrupt Organizations (RICO) conspiracy.

Grichishkin and Skvortsov are pending sentencing and face a maximum penalty of 20 years in prison. 

The FBI investigated the case with critical assistance from law enforcement partners in Germany, Estonia and the United Kingdom.

By Raul

Raul Hernandez is a former journalist. He has worked as a newspaper reporter for more than 30 years at the El Paso Herald-Post, El Paso Times, Press Enterprise in Riverside, California and the Ventura County Star in California. He was a court reporter for more than 20 years.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.