SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Anthony @ Equity Investigations, Dear Anthony, -- Ignore unavailable to you. Want to Upgrade?


To: scion who wrote (119844)8/12/2015 10:52:56 AM
From: scion  Respond to of 122088
 
Hackers Made $100 Million With Info From Stolen Press Releases: FBI

"The lesson in this is your information is only as secure as the people you share it with."

By David Porter
Posted: 08/11/2015 05:14 PM EDT
huffingtonpost.com

NEWARK, N.J. (AP) — An international web of hackers and traders made $100 million on Wall Street by stealing a look at corporate press releases before they went out and then trading on that information ahead of the pack, federal authorities charged Tuesday.

Authorities said it was the biggest scheme of its kind ever prosecuted, and one that demonstrated yet another way in which the financial world is vulnerable to cybercrime.

In an insider-trading scandal with a 21st-century twist, the hackers pulled it off by breaking into the computers of some of the biggest business newswire services, which put out earnings announcements and other press releases for a multitude of corporations.

Nine people in the U.S. and Ukraine were indicted on federal criminal charges, including securities fraud, computer fraud and conspiracy. And the Securities and Exchange Commission brought civil charges against the nine plus 23 other people and companies in the U.S. and Europe.

The case "illustrates the risks posed for our global markets by today's sophisticated hackers," SEC chief Mary Jo White said. "Today's international case is unprecedented in terms of the scope of the hacking at issue, the number of traders involved, the number of securities unlawfully traded and the amount of profits generated."

The nine indicted include two people described as Ukrainian computer hackers and six stock traders. Prosecutors said the defendants made $30 million from their part of the scheme.

Authorities said that beginning in 2010 and continuing as recently as May, the hackers gained access to more than 150,000 press releases that were about to be issued by Marketwired of Toronto; PR Newswire in New York; and Business Wire of San Francisco. The press releases contained earnings figures and other corporate information.

A strong earnings report or other positive news can cause a company's stock to rise, while disappointing news can make it fall. The conspirators typically used the advance information to buy stock options, which are essentially a bet on the direction a stock will move, authorities said.

In 2013, for example, the hackers got an early peek at a press release from Panera Bread Co. announcing that it was lowering its earnings projections. The hacking ring bet correctly the stock would fall when the news came out, and turned a profit of about $1 million the very next day, according to the indictment.

The hackers were routinely paid a cut of the profits, prosecutors alleged.

"This is the story of a traditional securities fraud scheme with a twist — one that employed a contemporary approach to a conventional crime," said Diego Rodriguez, head of the FBI's New York office.

Five defendants were arrested in the U.S. on Tuesday, and warrants were issued for four others in Ukraine.

Among those charged were Pavel, Igor and Arkadiy Dubovoy. Authorities said they are related but didn't say how. Arkadiy and Igor were arrested at their homes in Alpharetta, Georgia. Pavel was believed to be in Ukraine.

It wasn't immediately known whether the defendants had attorneys.

Paul Fishman, U.S. attorney for New Jersey, said the case exemplified the "intersection of hacking and securities fraud" and called the defendants "relentless and patient."

At various times, the indictment alleges, the hackers were locked out of the news services' computer systems. According to Fishman, they eventually managed to get back in, often by simple "phishing," or sending bogus emails with links that, if clicked on, can lead a hacker to a computer user's login and password.

The case shows how hackers are expanding their efforts beyond typical moneymaking information such as credit card and Social Security numbers.

It's also another example of how companies are often at the mercy of those they do business with. Many major hackings have been pulled off by penetrating third-party companies that have access to sensitive information.

"The lesson in this is your information is only as secure as the people you share it with," said Matthew L. Schwartz, a former federal prosecutor in New York. "If you share that information with a news service, a PR firm or even a law firm, then you need to make sure that it's secure."

Business Wire said it has hired a cybersecurity firm to test its systems and make sure they are protected. PR Newswire said it is cooperating with the investigation, and added: "We take security very seriously and are dedicated to protecting our information and systems." Marketwire did not immediately respond to a request for comment.

The hacker group made more than $600,000 by trading the stock of Caterpillar Inc. in 2011 after getting an advance look at a news release that said the heavy-equipment maker's profits were up 27 percent, according to the indictment.

Similarly, the group made more than $1.4 million trading stock in Silicon Valley's Align Technology in 2013 ahead of a press release that said revenue had climbed more than 20 percent, the indictment said.

The most serious charges in the indictment, wire fraud and securities fraud, carry up to 20 years in prison.

The SEC lawsuit named 17 individuals and 15 companies in the U.S. and abroad, in such places as Russia, France, Malta and Cyprus. The agency is seeking unspecified fines and restitution against the 32 defendants.

___

Associated Press writers Bree Fowler and Joseph Pisani, in New York, and AP Business Writer Marcy Gordon, in Washington, contributed to this story.

___

This story has been corrected to show that the 23 others charged by the SEC include both individuals and companies.

huffingtonpost.com



To: scion who wrote (119844)8/12/2015 10:57:51 AM
From: scion  Read Replies (1) | Respond to of 122088
 
SEC Charges 32 Defendants in Scheme to Trade on Hacked News Releases
Hackers, Traders Allegedly Reaped More Than $100 Million of Illegal Profits

FOR IMMEDIATE RELEASE
2015-163

SEC complaint
sec.gov

Washington D.C., Aug. 11, 2015 — The Securities and Exchange Commission today announced fraud charges against 32 defendants for taking part in a scheme to profit from stolen nonpublic information about corporate earnings announcements. Those charged include two Ukrainian men who allegedly hacked into newswire services to obtain the information and 30 other defendants in and outside the U.S. who allegedly traded on it, generating more than $100 million in illegal profits.

The SEC’s complaint unsealed today was filed under seal on August 10 in U.S. District Court in Newark, N.J., and the court entered an asset freeze and other preliminary relief that day.

“This international scheme is unprecedented in terms of the scope of the hacking, the number of traders, the number of securities traded and profits generated,” said Securities and Exchange Commission Chair Mary Jo White. “These hackers and traders are charged with reaping more than $100 million in illicit profits by stealing nonpublic information and trading based on that information. That deception ends today as we have exposed their fraudulent scheme and frozen their assets.”

The SEC charges that over a five-year period, Ivan Turchynov and Oleksandr Ieremenko spearheaded the scheme, using advanced techniques to hack into two or more newswire services and steal hundreds of corporate earnings announcements before the newswires released them publicly. The SEC further charges that Turchynov and Ieremenko created a secret web-based location to transmit the stolen data to traders in Russia, Ukraine, Malta, Cyprus, France, and three U.S. states, Georgia, New York, and Pennsylvania. The traders are alleged to have used this nonpublic information in a short window of opportunity to place illicit trades in stocks, options, and other securities, sometimes purportedly funneling a portion of their illegal profits to the hackers.

“This cyber hacking scheme is one of the most intricate and sophisticated trading rings that we have ever seen, spanning the globe and involving dozens of individuals and entities,” said Andrew Ceresney, Director of the SEC’s Division of Enforcement. “Our use of innovative analytical tools to find suspicious trading patterns and expose misconduct demonstrates that no trading scheme is beyond our ability to unwind.”

In parallel actions, the U.S. Attorney’s Office for the District of New Jersey and the U.S. Attorney’s Office for the Eastern District of New York today announced criminal charges against several of the defendants in the SEC’s action, including Turchynov and Ieremenko, and traders in the U.S. and Ukraine – Arkadiy Dubovoy, Igor Dubovoy, Pavel Dubovoy, Vitaly Korchevsky, Vladislav Khalupsky, Aleksandr Garkusha, and Leonid Momotok.

According to the SEC’s complaint, Turchynov and Ieremenko hid the intrusions by using proxy servers to mask their identities and by posing as newswire service employees and customers. The two allegedly recruited traders with a video showcasing their ability to steal the earnings information before its public release. The complaint charges that in return for the information, the traders sometimes paid the hackers a share of their profits, even going so far as to give the hackers access to their brokerage accounts to monitor the trading and ensure that they received the appropriate percentage of the profits. The complaint charges that the traders sought to conceal their illicit activity by establishing multiple accounts in a variety of names, funneling money to the hackers as supposed payments for construction and building equipment, and trading in products such as contracts for difference (CFDs).

At times, the hackers and traders had a very narrow window of opportunity to extract and use the allegedly hacked information. In one particularly dramatic instance on May 1, 2013, the hackers and traders allegedly moved in the 36-minute period between a newswire’s receipt and release of an announcement that a company was revising its earnings and revenue projections downward. According to the SEC’s complaint, 10 minutes after the company sent the still-confidential release to the newswire, traders began selling short its stock and selling CFDs, realizing $511,000 in profits when the company’s stock price fell following the announcement.

The SEC’s complaint charges each of the 32 defendants with violating federal antifraud laws and related SEC antifraud rules and seeks a final judgment ordering the defendants to pay penalties, return their allegedly ill-gotten gains with prejudgment interest, and be subject to permanent injunctions from future violations of the antifraud laws.

The SEC’s investigation was conducted by Market Abuse Unit staff Jason Burt, Kelly Gibson, Lynn O’Connor, James Scoggins, Jonathan Warner, Darren Boerner, John Marino, John Rymas and Mathew Wong, Complex Financial Instruments Unit staff Creola Kelly and Daniel Koster, Enforcement staff in the SEC’s Washington, D.C., office – Mark Cave and Jeffrey Weiss, Denver Regional Office staff Dan Konosky, and IT Forensics staff Ken Zavos, with assistance from the Office of International Affairs. The case was supervised by Joseph Sansone, Acting Co-Chief of the SEC Enforcement Division’s Market Abuse Unit and Reid Muoio, Deputy Chief of the SEC Enforcement Division’s Complex Financial Instruments Unit. David Axelrod and John Donnelly of the Philadelphia Regional Office are leading the SEC’s litigation. The SEC appreciates the assistance of the U.S. Attorney’s Offices for the District of New Jersey and the Eastern District of New York, Federal Bureau of Investigation, The Department of Homeland Security and the U.S. Secret Service, the Financial Industry Regulatory Authority, the United Kingdom Financial Conduct Authority, and the Danish Financial Supervisory Authority.

###

sec.gov