Friday, 05 May 2023 06:16

Try2Check Dismantled by Authorities, $10M Reward Posted for its Creator

Written by

Reading time is around minutes.

There you are doing your stollen credit card number shopping, like you do every Sunday. You come across a big batch of them, and the deal seems good. How do you know these things are real? I mean this isn’t exactly Amazon with reviews and a return policy. This is a dark web marketplace. The answer to your dilemma is to use a card checking service. One of, if not the, most popular services on the darker side of the web was Try2Check. I say was since this system was taken down by the US Government this week in what has been described as a multi-national operation.

Try2Check was so large that it was often white labeled and embedded dark web marketplaces. This speaks to the level of trust that both the purchasers and sellers of stollen card data had for it. Since marketplaces often gave refunds for proven inactive or dead card numbers the demand for a reliable and “trustworthy” source was there. Denis Kulkov stepped up in 2005 and rapidly rose to the top with Try2Chreck charging just 20 cents per card, he quickly made upwards of $18 Million off the illicit service.

The story of how Kulkov was linked to Try2Check is a long and interesting one involving cybercrime forums, usernames, email addresses, iCloud accounts, Facebook, ICQ numbers, and hacked/leaked materials from various Russian agencies, web sties etc. All of these put together along with photos of Kulvos and his Ferrari create a nice evidence chain connecting him to the service. The US Authorities, in addition to seizing and website used for the service, have also issued a $10 Million reward for information leading to the arrest or conviction of Kulov. Given how easy it was to find and identify him and his Ferrari, this does not sound like too much of a task. You just must get him to leave Russia. Russia has offered something of a sanctuary for cybercriminals if they focus their efforts externally and leave Russian interests alone. It makes opportunities for catching these criminals challenging at best.

Still there are chances. Russia-Ukraine war has forced a few who operated inside the Ukrainian boarder to flee to different countries (other than Russia) leaving them exposed to arrest. Mark Sokolovsky who ran Raccoon malware-as-a-service was caught in March of 2022 while trying to get out of compulsory military service in Ukraine. Vyacheslav Penchukov, another high-profile cybercriminal was caught fleeing the Ukraine while trying to meet up with his wife. Or course these examples are both people fleeing a war in their own home country. Kulkov, from all appearances seems comfortable staying in Russia with his ill-gotten gains and his Ferrari.

Read 532 times

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.