Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 18, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 18, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 18, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 18, 2025

      New Xbox games launching this week, from May 19 through May 25 — Onimusha 2 remaster arrives

      May 18, 2025

      5 ways you can plug the widening AI skills gap at your business

      May 18, 2025

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025

      Gears of War: Reloaded — Release date, price, and everything you need to know

      May 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025
      Recent

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025

      NodeSource N|Solid Runtime Release – May 2025: Performance, Stability & the Final Update for v18

      May 17, 2025

      Big Changes at Meteor Software: Our Next Chapter

      May 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      New Xbox games launching this week, from May 19 through May 25 — Onimusha 2 remaster arrives

      May 18, 2025
      Recent

      New Xbox games launching this week, from May 19 through May 25 — Onimusha 2 remaster arrives

      May 18, 2025

      Windows 11 KB5058411 install fails, File Explorer issues (May 2025 Update)

      May 18, 2025

      Microsoft Edge could integrate Phi-4 mini to enable “on device” AI on Windows 11

      May 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    November 22, 2024

    PopeyeTools Website

    The U.S. Department of Justice has announced the seizure of the PopeyeTools website, a notorious cybercrime website that facilitated the trafficking of stolen financial information and tools for committing fraud. Along with this major takedown, criminal charges have been filed against three administrators of the site: Abdul Ghaffar, 25, of Pakistan; Abdul Sami, 35, of Pakistan; and Javed Mirza, 37, of Afghanistan.  

    The trio is accused of running a multi-million-dollar cybercrime operation that sold stolen credit card details, bank account information, and other illicit goods to criminals around the world. The Justice Department’s action marks the latest in a series of efforts to disrupt illegal online marketplaces that contribute to cybercrime, including the recent seizure of the PopeyeTools website, which had been operating since 2016.  

    The Seizure of the PopeyeTools Website 

    The website, which has been described as a major hub for cybercriminals, sold access devices such as stolen credit card and bank account numbers, and personally identifiable information (PII) for at least 227,000 individuals. PopeyeTools also allegedly generated over $1.7 million in revenue from its illicit activities. 

    The cybercrime website PopeyeTools was known for offering a wide array of stolen data, including “live” credit card information, bank logs, and email spam lists, all marketed to criminals seeking to exploit these items for fraudulent activity.

    One of the site’s most notable sections, “Live Fullz,” offered working credit card data for around $30 per card, with guarantees that the data would be valid for fraudulent transactions. Another section, “Fresh Bank Logs,” offered stolen banking information, while other parts of the site provided scam guides, tutorials, and spam email lists to help criminals in their endeavors. 

    In addition to providing stolen financial data, the PopeyeTools website provided tools that allowed customers to verify the validity of stolen data and offered to refund or replace invalid data, further enhancing its reputation as a reliable source for cybercriminals. 

    The Justice Department’s Role in Disrupting Cybercrime 

    Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division, emphasized the department’s commitment to using every tool available to combat cybercrime. As alleged, Ghaffar, Sami, and Mirza founded and ran a longstanding online marketplace that sold illicit goods and services for use in committing cybercrimes, including ransomware attacks and financial frauds,” she said. Today’s announcement of the takedown of the PopeyeTools domains, the criminal charges against its operators, and the seizure of cryptocurrency is yet another example of our ‘all-tools’ approach to combatting cybercrime.” 

    The Justice Department’s efforts to shut down the PopeyeTools website are part of a broader strategy to dismantle online platforms that facilitate cybercrime and fraud. The U.S. government worked closely with international law enforcement agencies, including those from the United Kingdom and Malaysia, to bring the perpetrators to justice. 

    PopeyeTools Website Shutdown and Cryptocurrency Seizure 

    PopeyeTools website

    The U.S. government took decisive action by obtaining judicial authorization to seize the domains associated with the PopeyeTools website: www.PopeyeTools.com, www.PopeyeTools.co.uk, and www.PopeyeTools.to. The website had been a major platform for the sale of stolen financial data and cybercrime tools. Additionally, the government seized approximately $283,000 worth of cryptocurrency from an account controlled by one of the administrators, Abdul Sami. 

    The FBI, which played a key role in investigating the PopeyeTools cybercrime website, emphasized that dismantling the infrastructure of cybercriminals is crucial to reducing the threat posed by online fraud. FBI Assistant Director Bryan Vorndran of the Cyber Division stated, “In addition to unsealing charges against the administrators of PopeyeTools, we’ve also seized domains and cryptocurrency associated with the cybercriminal marketplace. The FBI will continue to relentlessly pursue the facilitators of cybercrime along with their tools and resources.” 

    Legal Consequences for the Administrators 

    The charges against Abdul Ghaffar, Abdul Sami, and Javed Mirza are serious, with each facing a maximum sentence of 10 years in prison for each of the three access device offenses they are accused of committing. If convicted, the three men will face severe penalties, though a federal judge will determine the final sentence based on the U.S. Sentencing Guidelines and other statutory factors. 

    U.S. Attorney Trini E. Ross for the Western District of New York stressed the importance of the operation in protecting the public, noting, “I continue to commend the work of our federal law enforcement partners, who joined forces with law enforcement across the globe, to disrupt this illicit marketplace. The perpetrators of this illegal marketplace allegedly sold the credit card information and personally identifiable information of hundreds of thousands of victims, some who live in western New York.” 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
    Next Article AI and Open Source Security: The Critical Role of AI-Powered Fuzzing in Finding Flaws

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 18, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 18, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Hypernetwork Fields: Efficient Gradient-Driven Training for Scalable Neural Network Optimization

    Development

    Universal-2 vs OpenAI’s Whisper: Comparing Speech-to-Text models in real-world use cases

    Artificial Intelligence

    Getting Started with Azure DevOps Boards and Repos

    Development

    This Research from Amazon Explores Step-Skipping Frameworks: Advancing Efficiency and Human-Like Reasoning in Language Models

    Development

    Highlights

    CVE-2025-37833 – Linux Niu PCI-MSIX Touch Entry Data Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37833

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads

    Fix niu_try_msix() to not cause a fatal trap on sparc systems.

    Set PCI_DEV_FLAGS_MSIX_TOUCH_ENTRY_DATA_FIRST on the struct pci_dev to
    work around a bug in the hardware or firmware.

    For each vector entry in the msix table, niu chips will cause a fatal
    trap if any registers in that entry are read before that entries’
    ENTRY_DATA register is written to. Testing indicates writes to other
    registers are not sufficient to prevent the fatal trap, however the value
    does not appear to matter. This only needs to happen once after power up,
    so simply rebooting into a kernel lacking this fix will NOT cause the
    trap.

    NON-RESUMABLE ERROR: Reporting on cpu 64
    NON-RESUMABLE ERROR: TPC [0x00000000005f6900]
    NON-RESUMABLE ERROR: RAW [4010000000000016:00000e37f93e32ff:0000000202000080:ffffffffffffffff
    NON-RESUMABLE ERROR: 0000000800000000:0000000000000000:0000000000000000:0000000000000000]
    NON-RESUMABLE ERROR: handle [0x4010000000000016] stick [0x00000e37f93e32ff]
    NON-RESUMABLE ERROR: type [precise nonresumable]
    NON-RESUMABLE ERROR: attrs [0x02000080]
    NON-RESUMABLE ERROR: raddr [0xffffffffffffffff]
    NON-RESUMABLE ERROR: insn effective address [0x000000c50020000c]
    NON-RESUMABLE ERROR: size [0x8]
    NON-RESUMABLE ERROR: asi [0x00]
    CPU: 64 UID: 0 PID: 745 Comm: kworker/64:1 Not tainted 6.11.5 #63
    Workqueue: events work_for_cpu_fn
    TSTATE: 0000000011001602 TPC: 00000000005f6900 TNPC: 00000000005f6904 Y: 00000000 Not tainted
    TPC:
    g0: 00000000000002e9 g1: 000000000000000c g2: 000000c50020000c g3: 0000000000000100
    g4: ffff8000470307c0 g5: ffff800fec5be000 g6: ffff800047a08000 g7: 0000000000000000
    o0: ffff800014feb000 o1: ffff800047a0b620 o2: 0000000000000011 o3: ffff800047a0b620
    o4: 0000000000000080 o5: 0000000000000011 sp: ffff800047a0ad51 ret_pc: 00000000005f7128
    RPC:
    l0: 000000000000000d l1: 000000000000c01f l2: ffff800014feb0a8 l3: 0000000000000020
    l4: 000000000000c000 l5: 0000000000000001 l6: 0000000020000000 l7: ffff800047a0b734
    i0: ffff800014feb000 i1: ffff800047a0b730 i2: 0000000000000001 i3: 000000000000000d
    i4: 0000000000000000 i5: 0000000000000000 i6: ffff800047a0ae81 i7: 00000000101888b0
    I7:
    Call Trace:
    [] niu_try_msix.constprop.0+0xc0/0x130 [niu]
    [] niu_get_invariants+0x183c/0x207c [niu]
    [] niu_pci_init_one+0x27c/0x2fc [niu]
    [] local_pci_probe+0x28/0x74
    [] work_for_cpu_fn+0x8/0x1c
    [] process_scheduled_works+0x144/0x210
    [] worker_thread+0x13c/0x1c0
    [] kthread+0xb8/0xc8
    [] ret_from_fork+0x1c/0x2c
    [] 0x0
    Kernel panic – not syncing: Non-resumable error.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4059 – Code-projects Prison Management System Stack-Based Buffer Overflow

    April 29, 2025

    6 reasons why iOS 18 makes the iPhone 16 a must-upgrade for me

    June 18, 2024

    Selenium to Playwright Migration Guide

    January 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.