Logo

123: Newswires

en-us

September 06, 2022

TLDR: A group of traders and hackers try to crack the stock market by seeing into the future. They get help from Thinkst Canary to attract malicious actors and Juniper Networks for network operations and visibility.

1Ask AI
  • The Dishonest and Unethical Practice of Insider TradingInsider trading is illegal and unreliable, and using privileged information to gain an unfair advantage is both dishonest and unethical. The stock market must remain fair and transparent to avoid any exploitation of confidential or non-public information.

    Insider trading is an illegal practice in the stock market where traders obtain privileged information about a company's internal reports or financial data, before it is publicly disclosed. Such information gives them an unfair advantage over other traders and investors, making the process dishonest and unethical. Predicting the future of a company is hard and often risky, and relying on insider information to make trades isn't a reliable method. Despite the illegality and the risk involved in insider trading, people still try to obtain privileged information and profit from it. It's important to maintain fairness in the stock market and to avoid using confidential or non-public information to gain an advantage over others.

  • A Tense and Risky Airport Meeting for an Insider Trading SchemeConducting sensitive business meetings in public places can compromise information security and lead to legal repercussions. Always choose a secure location to discuss confidential matters.

    The busiest airport in the world, Atlanta Airport was once the scene of an important business meeting that involved a carefully-timed on-the-hop business meeting by a Ukrainian stockbroker named Arkadiy Dubovoy, his business partner Alexander Garkusha and Vitaly Korchevsky, a hedge fund manager from Wall Street. Arkadiy proposed a foolproof way of having access to top-level insider financial information on big US companies before anyone else knew about it, which could be used to make big trades on that company's stock with insane profits. This one-of-a-kind insider trading scheme was discussed in the airport, which is not the best place for such an important business meeting.

  • Insider Trading and the Importance of Regulating such ActivitiesInsider information can result in huge profits or losses, and it is important to regulate such activities to prevent illegal means to make money in the stock market.

    Insider information on financial reports of publicly traded companies can result in big profits or losses in the stock market. Newswire agencies specialize in distributing financial reports and other news that a company needs to relay to its shareholders, making the process easier for the companies. This kind of financial information can have a huge impact on investors and stock prices in the market. Vitaly, using his stock market knowledge, teamed up with Arkadiy who had reliable insider information by accessing financial reports before they were made public, and Ivan, a hacker, to make more money illegally. This shows how people can use illegal means to gain profits in the stock market and how important it is to regulate such activities.

  • The Vulnerability of Digital Networks and the Importance of CybersecurityImplementing robust cybersecurity measures such as regular security assessments and employee training can prevent cyberattacks like the theft of non-public press releases which can lead to significant financial losses. Prevention is key in cybersecurity.

    The theft of non-public press releases from leading newswire agencies through SQL injection attacks and phishing emails highlights the vulnerability of digital networks where information is stored before release. Cybercriminals can target such vulnerabilities to exploit sensitive data, leading to significant financial losses for unsuspecting traders and businesses. Organizations must prioritize cybersecurity and implement robust measures to prevent such attacks. Such measures include network monitoring, regular security assessments, multi-factor authentication, and employee training to avoid phishing attacks. Prompt release of software patches and updates to prevent known vulnerabilities can also prevent such breaches. Prevention is always better than cure in cybersecurity.

  • Using Automated Systems and Video Demos to Streamline Insider Trading SchemesInsider traders can benefit from automation and video demonstrations to make the process of parsing information and covering tracks easier, while the SEC's use of advanced technology makes it challenging to engage in illegal trades.

    Insider trading schemes involve fast processing of a lot of information that could move the market and traders need to plan their exit. It becomes tedious and repetitive to download and share press releases manually. An automated system can ease the process and make it easier to parse information. Traders may not be tech-savvy so video demos help them access the press releases on the server and share tips on how to cover their tracks using VPNs and proxies. The SEC uses advanced technology such as the Artemis system to detect illegal trades. Ivan, the hacker, lost his backdoor access into PR Newswire in January 2011 but found another way to keep a steady flow of press releases to traders.

  • The Costly Consequences of Insider Trading and Information BreachTight security measures and ethical business practices are critical in preventing insider trading and protecting sensitive information. Any breach can lead to costly lawsuits and reputational damage.

    Insider trading can yield huge profits in a short amount of time, as seen in the examples of Dendreon Corp and Caterpillar Inc. The crucial role of the hacker Ivan is also evident in this scheme. However, leaving breadcrumbs behind can lead to the identification of those involved in the scheme. Marketwire even filed a $25 million lawsuit against PR Newswire for allegedly poaching their staff to gain confidential information and trade secrets. Overall, the case highlights the importance of tight security measures in companies that handle sensitive information.

  • Hacking and Trading in Collaboration for MillionsCollaboration between hackers and traders can lead to major financial gain, but eventually, bragging and carelessness can lead to their downfall and criminal charges. The authorities are always watching.

    The hacking scheme involved two distinct skill sets- hacking and trading, working together to make millions of dollars by stealing press releases and making trades based on that information. The traders didn't know the hackers, and there were middlemen to distance them. However, a drunk bragging by Ivan to his friends led to a double-cross, resulting in Ivan losing access to the source of valuable press releases. The FBI discovered the breach and Ivan's backdoor in PR Newswire's systems, leading to the removal of his access and Olek managing to restore his own access, but unbeknownst to them, the authorities were onto Ivan, and they had him firmly in their sights.

  • How Insider Trading and Hackers Worked Together for ProfitInsider traders and hackers collaborated to profit from selling valuable information. Their scheme lasted until authorities caught on, proving that crime doesn't pay.

    Hackers know the value of information. They carry out schemes to sell financial, business or personal data. The longer the scam runs, the more confident everyone gets. The insider traders know which press releases are more valuable or useful than the others. They ask for early access to them and receive profits after trading. Ukraine has extradition laws that protect the citizens from another country's authorities. This led the hackers to keep the scheme going. The introduction of new traders increased the profits but also increased the risk for the criminals. Money attracted the criminals to expand the business, and they kept living the luxurious lifestyle until the authorities caught them. The crime didn't pay in the end.

  • International Hacking Scheme Exposes Profitable Trading ScamSeven individuals arrested and found guilty after hacking and trading scheme exposed. Confidential news releases stolen led to over $30 million in profits, with multiple law enforcement agencies involved in investigation and seizure of funds and properties.

    An international hacking and trading scheme involving several people was uncovered and litigated, resulting in seven arrests and guilty pleas from some of the involved individuals. The scheme involved hacking the networks and servers of Marketwired, PR Newswire, and Business Wire in Ukraine to steal over 100,000 confidential news releases. Using various hacking tactics, the individuals involved in the scheme made over $30 million by trading ahead of more than 800 releases. The investigation, indictment, and trial involved multiple law enforcement agencies, resulting in the seizure of seventeen bank and brokerage accounts and fifteen properties believed to contain over $6.5 million. The evidence presented in the trial revealed the extent of the involvement of each individual in the scheme.

  • Insider trading using hacking leads to multi-million-dollar scheme and prison sentences.Financial fraud using hacking is a growing concern, leading to increased regulation and security measures. Even masterminds can be caught through real-time anomaly detection, and greed is often the driving force behind such schemes.

    Insider trading using hacking was used to make over $30 million. Vitaly and Vlad, the masterminds, were found guilty and sentenced to five and four years in prison, respectively. One hacker, Vadym, was caught and sentenced to two-and-a-half years in prison, with restitution of over $3 million. Ivan, Olek, and Pavel are still on the US most-wanted fugitives list for their involvement. The SEC now has tools to detect anomalies in real-time to prevent similar schemes. Greed drove the team to expand and cut corners, leading to their downfall. This scheme highlights the need for increased regulation and security measures to prevent financial fraud using hacking.

Was this summary helpful?

Recent Episodes

126: REvil

126: REvil

Darknet Diaries

Interviewed is Will from Equinix on REvil ransomware, a service that infected global systems with ransom demands and was countered by Zero Trust Exchange protection from Zscalar's traffic rule sets.

October 18, 2022

125: Jeremiah

125: Jeremiah

Darknet Diaries

Jeremiah Roe recalls a time when he tested the security of a building by breaking into it to prove its vulnerabilities.

October 04, 2022

124: Synthetic Remittance

124: Synthetic Remittance

Darknet Diaries

Evaldas Rimašauskas allegedly committed crimes combining social engineering and other tactics for financial gain in big tech.

September 20, 2022

122: Lisa

122: Lisa

Darknet Diaries

Host Lisa Forte shares insider threat stories in this podcast episode, which includes support content from Axonius, Varonis, and Snyk, as well as details on editing and sound design by various individuals.

August 23, 2022

Related Episodes

80: The Whistleblower

80: The Whistleblower

Darknet Diaries

A social engineer shares a story about getting people to do things they don't want to do for profit. They also discuss security threats with sponsors including SentinelOne and Thinkst Canary.

December 08, 2020

139: D3f4ult

139: D3f4ult

Darknet Diaries

D3f4ult was a hacktivist seeking changes, which were made. The show is sponsored by Axonius, Thinkst Canary, and Quorum Cyber, providing correlating asset data solutions through IT and security correlation to control complexity.

November 07, 2023

Ep 47: Project Raven

Ep 47: Project Raven

Darknet Diaries

An ex-NSA agent worked for a secret hacking group in the UAE, utilizing their skills and resources to enhance their operations and cover their tracks.

September 17, 2019

108: Marq

108: Marq

Darknet Diaries

This is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and police. Sponsors Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. View all active sponsors. Sources Court records and news articles were used to fact check this episode. However Marq requested that links to his full name not be made available. https://techcrunch.com/2019/12/19/ring-doorbell-passwords-exposed/ https://www.wired.com/2010/03/hacker-bricks-cars/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

January 11, 2022

AI

Ask this episodeAI Anything

Darknet Diaries

Hi! You're chatting with Darknet Diaries AI.

I can answer your questions from this episode and play episode clips relevant to your question.

You can ask a direct question or get started with below questions -

Sign In to save message history