• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware • Ransomware  /  Top 5 most wanted cybercriminals across the globe
Top 5 most wanted cybercriminals across the globe
13 November 2017

Top 5 most wanted cybercriminals across the globe

Written by Seqrite
Seqrite
Malware, Ransomware

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also involves weeding out organized crime related to the online domain. However, before we can devise strategies for combating the security incidents and data breaches, it is important to look at the most wanted cybercriminals who have facilitated the proliferation of ransomware attacks and other forms of cyber threats.

1. Bjorn Daniel Sundin

Sundin duped many online victims and conned them into buying “bogus software products”. Almost, 1 million copies were illegitimately sold. The financial extent of this global attack transpired up to $100 million, across diverse channels. His criminal history dates back to 2006 with accusations piling on with each passing year. Be it fake scams, browser hijacking and sending out error messages to unsuspecting users; Sundin is involved in a host of malicious activities and has a reward of $20,000 riding on his head.

2. Peteris Sahurovs

Similar to Sundin, Sahurovs also duped several individuals on the pretext of selling security programs. He conned unsuspecting victims for around $2 million by placing strategic adverts on online domains and newspapers. While he first posed as a legitimate ad agency, he started linking the content to a different address once the customers began showing interest in his product. At present, the FBI offers $50,000 for the information that helps them arrest Peteris Sahurovs.

3. Nicolae Popescu

Best known for using aliases like “Stoichitoiu” and “Nae”, Popescu was rightly accused in a sophisticated and organized fraud scheme related to the online domain. He posted fake advertisements on auction sites and put non-existent items on sale. While he was on the FBI radar since 2012, he has been continuously moving across different countries for evading the federal glare. He has a reward of $1 million riding on his head, against any information that leads to his arrest.

4. Farhan UI Arshad

Arshad was first involved in an internal telecommunication scam where he targeted individuals and conspired against the government entities. This scam was a part of a global scheme that was active between November 2008 and April 2012, inflicting financial losses in the ballpark of $50 million and compromising several data security networks. He also joined hands with large-scale organizations that helped proliferate cybercriminals across Saudi Arabia, Malaysia, Italy, Singapore and a host of other countries. While the FBI is still looking to track his whereabouts, it is presumed that he might have travelled to Pakistan, Germany, the United Kingdom, UAE and even Canada in the recent past. There is a sizeable reward of $50,000 on his head.

5. Shaileshkumar P. Jain

Jain was Sundin’s co-conspirator, helping him initiate the “bogus software products” scam, on a global scale. While the initial charges against him were similar to the ones on Sundin, he was additionally accused of computer and no wire frauds. His plans for scamming online users by selling fake software modules were largely successful courtesy the innovative techniques on offer. What served him right was having multiple bank accounts across the globe which allowed him to con users of a lot of money. Based on the current revelations, the FBI offers up to $20,000 as a reward for any information, leading to the conviction of this Indian cyber-criminal.

Bottom-Line

Cyber-crime has evolved into a catastrophic nemesis, and it’s time organizations put forth stringent laws and security schemes for combating the same. That said, analyzing the history of cyber-criminal activities can help companies modify their strategies, accordingly. That is why it is important to discuss about these existing cyber-criminals by looking into their criminal backgrounds and hacking techniques for gaining immunity against the futuristic threats.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostDeploying Endpoint Security: Key factors to consider
Next Post  Vulnerabilities are unavoidable: Here are the top 5 commandments ...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies