FBI for allegedly making hundreds of millions of dollars from hacking banks sites.

According to the Associated Press (AP), immigration police chief Lt. Gen. Panu Kerdlarppol, told reporters that Bendelladj was arrested on Sunday night during a layover at Thailand’s international airport while traveling to Egypt, from Malaysia where he and his family had been on vacation.

Kerdlarppol said that police confiscated two laptops, a tablet computer, a satellite phone and a number of external hard drives from the 24-year-old whom the FBI had been pursuing for nearly three years.

US authorities believe the suspect hacked private accounts in more than 217 banks and financial companies worldwide, causing about $10 million in losses per transaction.

Kerdlarppol said Bendelladj will be extradited to the U.S. state of Georgia, where a district court has issued an arrest warrant.

Over the past decade, cybercrime has continuously evolved, motivated by profit, ideology, and nationalism. The Internet has enabled criminals to ply their trade in new and innovative ways. The physical elements of crime have been replaced by digital trails that are becoming increasingly difficult for law enforcement agencies to follow.

Attribution for cybercrime is rare, and prosecution is even rarer. Yet, the fight continues as investigators work harder toward criminal attribution.

The term “Underground Economy” has historically been used to denote business that occurs outside of regulatory channels. Today the Underground Economy can be found in IRC networks, HTTP forums (web boards), various Instant Messaging services, and any other communications platform that lends itself to anonymous collaboration.

Today, the publicly available Underground Economy is a shell of its former self. The undercover operations targeting and subsequently arresting criminals involved in web forums like Shadow Crew, Carders Market, and Dark Market have pushed the fraud trade further underground.

The Underground Economy is comprised of criminals who typically specialize in a specific criminal commodity. A few of the more common commodities include credit/debit cards, personal identities, hacked servers, hacked network equipment, malware (malicious code).

Elsewhere on Ventures

Triangle arrow