Audrey Strauss, the Acting United States Attorney for the Southern District of New York, announced today that ANDREI TYURIN, a/k/a “Andrei Tiurin,” was sentenced in Manhattan federal court to 144 months in prison for computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies. TYURIN is charged with committing these crimes with Gery Shalon, a/k/a “Garri Shalelashvili,” a/k/a “Gabriel,” a/k/a “Gabi,” a/k/a “Phillipe Mousset,” a/k/a “Christopher Engeham,” Joshua Samuel Aaron, a/k/a “Mike Shields,” and Ziv Orenstein, a/k/a “Aviv Stein,” a/k/a “John Avery,” in furtherance of securities market manipulation, illegal online gambling, and payment processing fraud schemes perpetrated by Shalon, Aaron, Orenstein, and their co-conspirators. TYURIN previously pled guilty to these charges, and was sentenced today before U.S. District Judge Laura Taylor Swain.
Acting U.S. Attorney Audrey Strauss said: “From his home in Moscow, Andrei Tyurin played a major role in orchestrating and facilitating an international hacking campaign that included one of the largest thefts of U.S. customer data from a single financial institution in history, stealing the personal information of more than 80 million J.P. Morgan Chase customers. The conspiracy targeted major financial institutions, brokerage firms, news agencies, and other companies, and netted Tyurin over $19 million in criminal proceeds. Now Tyurin has been sentenced to 12 years in prison for his crimes.”
According to the allegations contained in the Indictments to which TYURIN pled guilty, other filings in this case, and statements made during court proceedings, including TYURIN’s guilty plea hearing:
From approximately 2012 to mid-2015, TYURIN engaged in an extensive computer hacking campaign targeting financial institutions, brokerage firms, and financial news publishers in the U.S. (including but not limited to J.P. Morgan Chase Bank, E*Trade, Scottrade, and the Wall Street Journal), and was responsible for the theft of personal information of over 100 million customers of the victim companies. TYURIN’s hack of J.P. Morgan Chase Bank alone resulted in the theft of personal information of over 80 million customers. TYURIN engaged in these crimes at the direction of his partner Gery Shalon, and in furtherance of other criminal schemes overseen and operated by Shalon and his co-conspirators, including securities fraud schemes in the United States. For example, in an effort to artificially inflate the price of certain stocks publicly traded in the U.S., Shalon and his co-conspirators marketed the stocks in a deceptive and misleading manner to customers of the victim companies whose contact information TYURIN stole in the intrusions.
In addition to the U.S. financial sector hacks, from approximately 2007 to mid-2015 TYURIN also conducted cyberattacks against numerous U.S. and foreign companies in furtherance of various criminal enterprises operated by Shalon and his co-conspirators, including unlawful internet gambling businesses and international payment processors. Nearly all of these illegal businesses, like the securities market manipulation schemes, exploited the fruits of TYURIN’s computer hacking campaigns. TYURIN’s hacking activity included the targeting of companies known to be used for email marketing campaigns, competitor online casinos, and a merchant risk intelligence firm based in the United States, in order for the co-conspirators to monitor the firm’s efforts to audit potentially criminal online credit card transactions on behalf of major credit card networks, and thus avoid detection of their own criminal schemes.
In furtherance of his hacking activities, TYURIN used computer infrastructure located across five continents, which he controlled from his home in Moscow, and maintained persistent access over extended periods of time to the victims’ networks, regularly refreshing the stolen data by repeatedly downloading information from these companies. And once his hacking activities were detected, TYURIN worked with Shalon to destroy the evidence of their criminal activity and undermine U.S. law enforcement’s efforts to identify and arrest them.
Through these various criminal schemes, TYURIN, Shalon, and their co-conspirators obtained hundreds of millions of dollars in illicit proceeds, and TYURIN himself earned over $19 million in profits from his hacking activity.
TYURIN, 37, of Moscow, Russia, pled guilty to one count of conspiracy to commit computer hacking, one count of wire fraud, one count of conspiracy to violate the Unlawful Internet Gambling Enforcement Act, and one count of conspiracy to commit wire fraud and bank fraud. In addition, TYURIN pled guilty to one count of conspiracy to commit wire fraud, and one count of conspiracy to commit computer hacking, from charges that were transferred from the Northern District of Georgia for purposes of his plea. In addition to the prison term, Judge Swain ordered TYURIN to serve three years of supervised release, and to pay forfeiture in the amount of $19,214,956. The Court will determine TYURIN’s restitution obligations at a hearing scheduled for April 6, 2021. TYURIN has been in U.S. custody since he was extradited from the country of Georgia in September 2018, and will commence serving his sentence immediately.
Ms. Strauss praised the investigative work of the FBI and the U.S. Secret Service, and expressed her sincere gratitude to the Chief Prosecutor’s Office of Georgia and the Ministry of Justice of Georgia for their support and assistance with the extradition proceedings. She also thanked the Securities and Exchange Commission, Homeland Security Investigations, the Financial Industry Regulatory Authority, the Office of International Affairs of the U.S. Department of Justice’s Criminal Division for its assistance with the extradition, and the Financial Services Information Sharing and Analysis Center, which significantly aided the investigation by facilitating information sharing among the victim institutions.
The prosecution of this case is being overseen by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorneys Eun Young Choi, Noah Solowiejczyk, and Sarah Lai are in charge of the prosecution.