Predict your next investment

INTERNET | Internet Software & Services
rbsworldpay.us

See what CB Insights has to offer

Founded Year

1991

Stage

Mezzanine | Alive

Total Raised

$10M

Valuation

$0000 

About RBS WorldPay

RBS WorldPay was a Internet/Internet Software & Services company based in Atlanta, Georgia. RBS WorldPay was acquired in 2004.

RBS WorldPay Headquarter Location

600 Morgan Falls Road Suite 260

Atlanta, Georgia, 30350,

United States

770-396-1616

Latest RBS WorldPay News

Cybercrime Roundup: WorldPay Update

Sep 18, 2017

Cybercrime Roundup: WorldPay Update On July 20, Judge Steven Jones of the Northern District of Georgia sentenced Evgeny Levitskyy (known by the moniker M.ur.d.e.r.e.r.) to 46 months in prison and three years of supervised release. Levitskyy must also pay restitution to the tune of $499,518.51. The sentence was based on Levitskyy’s guilty plea to one count of conspiracy to commit bank fraud. On October 13, 2015, Levitskyy was indicted on eight counts (including bank fraud, conspiracy to commit wire fraud, and wire fraud) relating to an elaborate and structured hacking scheme that defrauded an Atlanta company and yielded the cybercriminals over $9 million dollars. The scheme centered on prepaid bank cards, which some employers issue to their employees in lieu of checks or direct deposits. In 2012, nearly 4.5 million US workers were paid via prepaid payroll cards. Employers prefer them because they cut down on overhead­—up to $5 million per year, for example, for the parent company of several large restaurant chains. Employees are not always fond of the cards; numerous fees deplete the income that is often already scarce in the industries where the cards are heavily used (retail and food service). As it turns out, fees are not the only headache the cards pose. In order to facilitate making payroll with these cards, employers use companies like RBS WorldPay to handle payroll processing, as well as processing the transactions from the prepaid payroll cards. Oleg Covelin, a hacker in Moldova, learned of a vulnerability on the RBS WorldPay network that could be exploited for financial gain. Using this knowledge, a structured and organized group of cybercriminals worked in concert to defraud RBS WorldPay and its associated banks. Covelin reached out to Sergei Tsurikov, a cybercriminal in Estonia, who acted as the bridge between those who found the vulnerability and those capable of exploiting it. In search of a cybercriminal with the requisite skills, Tsurikov contacted Viktor Pleshchuk, a hacker in St. Petersburg, Russia. Between November 4 and November 8, 2008, Pleshchuk (as well as Tsurikov and Evgeniy Anikin, another cybercriminal) gained access to RBS WorldPay’s network, from which he stole account numbers for prepaid payroll cards, then reverse-engineering the PINs for those accounts from RBS WorldPay’s encrypted data. He also raised the limits on those particular prepaid payroll cards. Armed with 44 such account numbers and pins, Pleshchuk turned the operation over to Anikin. Anikin managed a network of cashers, people who used the prepaid payroll card account numbers and corresponding PINs to withdraw cash at ATMs. The network used lead cashers, including Levitskyy, who were each assigned at least one account number and PIN that they distributed to numerous cashers. Tsurikov operated his own network of cashers that operated solely in Estonia. On November 8, 2008, the coordinated 12-hour blitz began. Cashers used the 44 prepaid payroll cards at 2,100 ATMs in 280 cities to withdraw over $9 million dollars. The ATM withdraws occurred in various countries; the indictment lists  the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada. Tsurikov and Pleshchuk accessed RBS WorldPay’s network during these 12 hours to track the withdraws. After the operation was complete, they deleted (not entirely successfully) data of their crime from RBS WorldPay’s network. After withdrawing the cash, each casher kept 30 to 50 percent of the funds they withdrew and sent the rest to the lead cashers. Anikin was responsible for dividing up the proceeds. Covelin, the cybercriminal who found the vulnerability, received payment via a prepaid payroll card account number and PIN. He was able to withdraw substantial funds because his confederates raised the card limits. Visually, the organization looked like this: On November 10, 2009, the Department of Justice indicted Covelin, Tsurikov, Pleshchuk, and Anikin (listed as “Hacker 3”) on conspiracy to commit wire fraud, wire fraud, conspiracy to commit computer fraud, computer fraud, and identity theft. The same indictment charged the Estonian casher ring, including Igor Grudijev, Ronald Tsoi, Evelin Tsoi, and Mihhail Jevgennov, with access device fraud. That original indictment has been expanded to include additional co-conspirators. Others involved, including Levitskyy, have been charged in their own indictments. Here is how each has fared: Oleg Covelin: arrested in Russia, status of case unclear Sergei Tsurikov: arrested in Estonia; turned over to the FBS in Russia before Estonia extradited him to the United States; sentenced to 11 years in prison, 3 years supervised release, $8,400,000 restitution, and $9,477,146.67 forfeiture Victor Pleshchuk: arrested and tried in Russia, received a six-year suspended sentence, four years of probation, $8.9 million in restitution Evgeniy Anikin: arrested and tried in Russia; received a five-year suspended sentence Vladislav Horohorin: arrested in France and extradited to the United States; sentenced to 88 months in prison, 2 years supervised release, and $125,739 restitution Ezenwa Chukukere: sentenced to 108 months, 3 years supervised release, joint and several restitution of $1,618,317.68 Sonya Martin: arrested in the United States; sentenced to 30 months in prison, 5 years supervised release, and $89,000 restitution Visually, the charges and sentences look like this:  Roman Seleznev, no stranger to cybercrime prosecutions , pled guilty on September 7, 2017. He is scheduled for sentencing on December 11th. Notably, there is a substantial disparity between the Russian and American sentences. While Covelin’s status is unclear, the other two who were tried in Russia did not face any time in jail. The co-conspirators tried in the United States have received substantial sentences—11 years at the high end and 30 months at the low end. When Sonya Martin was sentenced to 30 months, there was some outcry about the brevity of the sentence. In April 2017, the European Council of Foreign Relations released a policy brief on the Kremlin’s use of Russian criminal networks. According to the brief, “[a]lthough there is evidence that Russian security agencies are increasingly developing their own in-house hacking capabilities, Moscow still depends, to a considerable extent, on recruiting cybercriminals, or simply calling on them from time to time, in return for their continued freedom. In an environment where the security of banking transactions is often questioned, “[t]his case demonstrates the Secret Service is committed to protecting our nation’s critical financial infrastructure and payment systems,” according to Special Agent in Charge Kenneth Cronin, of the US Secret Service. With Levitskyy’s sentencing, the Department of Justice also demonstrates its dogged pursuit of the WorldPay hackers almost nine years after the crime and underscores yet again that it prioritizes taking down cybercriminal networks and prosecuting offenders even if they reside outside of the United States. Topics:

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

RBS WorldPay Patents

RBS WorldPay has filed 6 patents.

The 3 most popular patent topics include:

  • Hairdressing
  • Injection molding
  • Mirrors
patents chart

Application Date

Grant Date

Title

Related Topics

Status

4/16/2012

4/2/2013

Hydrology, Soil physics, Biomaterials, Soil mechanics, Water

Grant

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

Application Date

4/16/2012

00/00/0000

00/00/0000

00/00/0000

00/00/0000

Grant Date

4/2/2013

00/00/0000

00/00/0000

00/00/0000

00/00/0000

Title

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Related Topics

Hydrology, Soil physics, Biomaterials, Soil mechanics, Water

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Status

Grant

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.