Score:   1
Docket Number:   WD-PA  2:18-cr-00263
Case Name:   USA v. MORENETS et al
  Press Releases:
PITTSBURGH – United States Attorney Scott W. Brady announced today that seven Russians were indicted by a federal grand jury in Pittsburgh on charges relating to a criminal hacking campaign that included the theft and public dissemination of private medical records of 250 athletes, including U.S. Olympic athletes. According to the indictment, the Russian hackers targeted the athletes and major anti-doping organizations in retaliation for a ban on Russian athletes due to Russia’s state sponsored doping program. The Russian hacking also targeted western Pennsylvania employees of the Westinghouse Electric Corporation, as well as an organization and laboratory investigating Russia’s alleged use of chemical weapons.

According to the indictment, the defendants are all members of a Russian military intelligence agency based in Moscow known as the GRU:

Aleksei Sergeyevich Morenets

Evgenii Mikhaylovich Serebriakov

Ivan Sergeyevich Yermakov

Artem Andreyevich Malyshev

Dmitriy Sergeyevich Badin

Oleg Mikhaylovich Sotnikov

Alexey Valerevich Minin

All seven defendants are charged with conspiracy to illegally access and cause damage to computers in the United States and elsewhere, conspiracy to commit wire fraud, and money laundering conspiracy. All except Sotnikov and and Minin are also charged with aggravated identity theft. Finally, Yermakov is charged with multiple counts of wire fraud for attempting to hack into the personal email accounts of employees of Westinghouse.

The targets of the hacking activity included:

• Westinghouse Electric Corporation based outside Pittsburgh, Pennsylvania;

• the U.S. Anti-Doping Agency (USADA), headquartered in Colorado Springs, Colorado;

• the World Anti-Doping Agency (WADA), headquartered in Montreal, Canada;

• the Canadian Centre for Ethics in Sport (CCES), headquartered in Ottawa, Canada;

• the International Association of Athletics Federations (IAAF), headquartered in Monaco;

• The Court of Arbitration for Sport (TAS/CAS), headquartered in Lausanne, Switzerland;

• the Fédération Internationale de Football Association (FIFA), headquartered in Zurich, Switzerland;

• the Organisation for the Prohibition of Chemical Weapons (OPCW), an organization headquartered in The Hague, Netherlands, investigating the use of chemical weapons in Syria and the March 2018 poisoning of a former GRU officer in the United Kingdom with a chemical nerve agent; and

• the Spiez Swiss Chemical Laboratory located in Spiez, Switzerland, an accredited laboratory of the OPCW that analyzed the chemical agent connected to the poisonings of a former GRU officer and others in the United Kingdom.

United States Attorney Scott W. Brady emphasized his office’s focus on bringing justice to the victims of these crimes. "Through the tireless efforts and investigative work by our office and the FBI, we have exposed and charged an expansive criminal conspiracy of targeted cyber-attacks across three continents and seven countries. These cyber-attacks were designed to steal individuals’ and organizations’ most sensitive secrets and data. We want the hundreds of victims of these Russian hackers to know that we will do everything we can to hold these criminals accountable for their crimes. State actors who target US citizens and companies are no different than any other criminal: they will be investigated, prosecuted and held accountable for their actions."

"Malicious cyber hackers will not be allowed to undermine, retaliate against or expose sensitive information that damages the reputations of innocent victims," said FBI Pittsburgh Special Agent in Charge Robert Jones. "This type of behavior is simply unacceptable. These charges show the world the FBI has a robust cyber investigative team and Pittsburgh is an essential part of it. We also want to thank our international partners, including the Royal Canadian Mounted Police and the Dutch Intelligence Service (the MIVD), for their support and coordination to ensure the safety of our people and networks."

The criminal hacking operation was conducted from an identified GRU Unit in Moscow, and by GRU members who traveled around the world to hack into nearby computers through "close access" operations. The indictment describes how the conspirators conducted several "on site" operations: in Rio De Janiero during and prior to the 2016 Olympic games, which compromised the email account of a USADA official; in Lausanne, Switzerland, resulting in the theft of login credentials from a CCES official; and, at The Hague in April 2018, in an attempt to hack into networks at OPCW. These on site operations often involved targeting Wi-Fi networks used by victim organizations or their personnel, including hotel Wi-Fi, in an effort to gain unauthorized access to the victims’ computer networks.

The defendants stole data from WADA, USADA, CCES, TAS/CAS, IAAF and FIFA which contained sensitive, private medical information for 250 athletes from 30 countries. They then released the data publicly, often in misleading ways, masquerading as the "Fancy Bears Hack Team" on the websites fancybear.net, fancybear.org and other social media accounts, as part of a misinformation campaign. The defendants’ intent was to unfairly damage the reputations of competitive athletes and to retaliate against international anti-doping officials who had exposed the Russian state-sponsored doping program. As part of this prosecution, the United States has seized the websites fancybear.net and fancybear.org and is seeking their forfeiture.

Defendants Morenets, Serebriakov, Malyshev and Badin face maximum penalties of 49 years in prison and a fine of up to $1.25 million. Defendants Sotkinov and Minin face maximum penalties of 45 years in prison and a $750,000 fine. Defendant Yermakov, who is the sole defendant charged in five wire fraud counts, faces a maximum sentence of 149 years imprisonment and a fine of $2.5 million. Under the Federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offenses and the prior criminal history, if any, of the defendant.

U.S. Attorney Brady commended the Federal Bureau of Investigation’s Pittsburgh and Philadelphia Divisions, as well as the Cyber Unit at FBI Headquarters and the FBI Legal Attaches around the world, the Royal Canadian Mounted Police, the Government of the Netherlands, including the Dutch Intelligence Service (the MIVD) and the Dutch prosecutor’s office Switzerland’s Office of the Attorney General, and the U.K.’s National Security and Intelligence Agencies.

If you believe you are a victim in this case and would like to opt-in to receive notifications or if you have any questions about your rights, please contact the Victim Witness Coordinator at 412- 894-7400 or through our website (https://www.justice.gov/usao-wdpa/vw/us-v-Aleksei- Sergeyevich-Morenets).

An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

Docket (0 Docs):   https://docs.google.com/spreadsheets/d/1nUsM_cPBOq5Ej2jQvYo9V07TqsufW7WxYEj3ML5gnfo
  Last Updated: 2024-04-10 04:13:35 UTC
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY

Description: The code of the federal judicial circuit where the case was located
Format: A2

Description: The code of the federal judicial district where the case was located
Format: A2

Description: The code of the district office where the case was located
Format: A2

Description: Docket number assigned by the district to the case
Format: A7

Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3

Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3

Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5

Description: Case type associated with the current defendant record
Format: A2

Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18

Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15

Description: The status of the defendant as assigned by the AOUSC
Format: A2

Description: A code indicating the fugitive status of a defendant
Format: A1

Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD

Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD

Description: The date when a case was first docketed in the district court
Format: YYYYMMDD

Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD

Description: A code used to identify the nature of the proceeding
Format: N2

Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD

Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2

Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE1
Format: N2

Description: The four digit AO offense code associated with FTITLE1
Format: A4

Description: The four digit D2 offense code associated with FTITLE1
Format: A4

Description: A code indicating the severity associated with FTITLE1
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the second highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE2
Format: N2

Description: The four digit AO offense code associated with FTITLE2
Format: A4

Description: The four digit D2 offense code associated with FTITLE2
Format: A4

Description: A code indicating the severity associated with FTITLE2
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the third highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE3
Format: N2

Description: The four digit AO offense code associated with FTITLE3
Format: A4

Description: The four digit D2 offense code associated with FTITLE3
Format: A4

Description: A code indicating the severity associated with FTITLE3
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the fourth highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE4
Format: N2

Description: The four digit AO offense code associated with FTITLE4
Format: A4

Description: The four digit D2 offense code associated with FTITLE4
Format: A4

Description: A code indicating the severity associated with FTITLE4
Format: A3

Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5

Description: The date of the last action taken on the record
Format: YYYYMMDD

Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD

Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD

Description: The date upon which the case was closed
Format: YYYYMMDD

Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8

Description: A count of defendants filed including inter-district transfers
Format: N1

Description: A count of defendants filed excluding inter-district transfers
Format: N1

Description: A count of original proceedings commenced
Format: N1

Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1

Description: A count of defendants terminated including interdistrict transfers
Format: N1

Description: A count of defendants terminated excluding interdistrict transfers
Format: N1

Description: A count of original proceedings terminated
Format: N1

Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1

Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1

Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1

Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10

Description: A sequential number indicating the iteration of the defendant record
Format: N2

Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD

Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
Format: YYYY

Data imported from FJC Integrated Database
F U C K I N G P E D O S R E E E E E E E E E E E E E E E E E E E E