- Security
- A
Kristina Svechinskaya: How a Young Russian Woman Became a Star of the Cybercriminal World
If you enter the phrase "most famous female hackers" into any foreign search engine, the impartial search engine will instantly generate a list, with Kristina Svechinskaya prominently featured at the top. Thanks to her attractive appearance and the attention of foreign media, she has become one of the most recognizable female "hackers." And it all began 15 years ago with one of the most unprecedented international special operations aimed at halting the activities of a cybercriminal network that had stolen millions of dollars from bank accounts. There was a lot of noise, but to this day, you won’t find specific information on how much money was stolen, who exactly stole it, or who was behind the creation and use of the ZeuS Trojan and the botnet built on it.
So, let's figure out what happened on October 1, 2010.
According to open and official sources, on October 1, 2010, in the USA, the FBI together with other law enforcement agencies carried out one of the largest special operations, resulting in the arrest of 37 people, including Svechinskaya, in New York and other cities. This operation became part of the largest international investigation aimed at disrupting a cybercriminal network that stole millions of dollars from bank accounts. According to the FBI website, hackers stole between $70 and $220 million. The investigation, which lasted about three years, was conducted by special cybercrime task forces in more than ten countries. As you can see, it was as serious as it gets.
What is known about the ZeuS trojan?
The ZeuS trojan (also known as Zbot) is one of the most infamous and destructive banking trojans in cybercrime history. First discovered by Kaspersky Lab in 2007, it became a tool for large-scale financial fraud and set the standard for most subsequent banking trojans, inspiring the creation of threats like SpyEye, Dridex, and TrickBot.
ZeuS, “mules” and others
To understand the level of computer literacy most people had at that time (and maybe still have today), it’s enough to recall one famously repetitive lecture (let’s remember that, it matters, we’ll come back to it). Given this reality, it wasn’t very difficult for the creators of ZeuS to infect millions of computers worldwide. The real problem was something else: how to cash out the stolen money.
One of the safest and most effective schemes of the time was working through “mules” (from the English money mule)—people who, often without realizing it, were used by cybercriminals to transfer or launder illegally obtained money. The mules would receive money into their bank accounts or e-wallets, and then transfer it onward as directed by the criminals, keeping a small percentage as a fee for their services.
In the late 90s, the hacker group Russian Business Network (RBN) became a pioneer in using elaborate schemes with mules to launder money obtained from phishing and malware. This scheme was used as a model by the creators of the ZeuS trojan. It was ZeuS that was tied to the first high-profile case of using an entire network of mules.
The money stolen from real accounts was collected by first-layer mules, who then transferred it to other mules in another country (the next layer, often with subsequent cash-out, for example, via Western Union). After that, the cash would be sent to third countries (a third layer) through similar mechanisms. All the transactions were carried out through fake identities.
Exactly how many such layers and mules there were can only be guessed. And here’s a teaser: let’s suppose that after some time the FBI, de jure, tracks down a certain Vasilisa Pupkina (an allegorical name in fake documents), but de facto, this Vasilisa literally disappeared from the United States just yesterday. And this is neither a joke, nor an allegory. How is that possible? To be continued.
Most of the accused mules in the ZeuS case were young people from post-Soviet countries (ages 20–26), who were in the US on the Work & Travel program (J-1 visa). This visa allowed them to stay in the US for about four months during the summer holidays, plus 30 extra days for traveling around the country after the work program ended. They were ideal first-layer mules who effectively disappeared after transferring the money. The chances of finding these people, let alone holding them accountable, were zero.
Kristina Svechinskaya — victim, “hacker,” or who?
Kristina Vladimirovna Svechinskaya was born on February 16, 1989, in Stavropol, Russia. She studied at Stavropol State University. In her third year, fluent in English, she participated in the Work & Travel program and moved to the US in summer 2010, where she initially worked in fast food in Massachusetts, and then relocated to New York to enroll at New York University (NYU).
For those who are not aware: participants of the Work & Travel program with a J-1 visa are required to return to their home country due to the "two-year home residency rule." To stay in the United States for studies, one either has to change their visa status while in the U.S. (which is incredibly difficult and not always possible) or return home and obtain a new student visa (F-1). Kristina did not return home.
NYU is one of the most prestigious and competitive universities in the U.S., with an acceptance rate of about 15% in 2010. Tuition at NYU in 2010 cost around $40,000–$50,000 per year for tuition alone, not including housing, food, and other expenses. The total cost could reach $60,000–$80,000 per year. One of the main requirements for admission is proof of financial ability to pay for tuition and living expenses (International Student Certification of Finances).
According to her close relatives, Kristina's family was barely making ends meet. But by some magical means, Kristina solved two incredibly difficult tasks: she got an F-1 visa and was admitted to NYU. This is roughly the equivalent of applying to NASA, becoming an astronaut, and then actually flying to the Moon.
Motivation, circumstances, and questions about recruitment and organizers
Despite the American legal system’s emphasis on transparency and openness of justice, there is no public information about how the hearings of the 20 defendants proceeded. There is even less data about who was behind recruiting Kristina and the rest, or why the FBI initially announced $200 million stolen, then only $70 million, and federal prosecutors limited it to just three million dollars.
Interestingly, 18 out of the 20 arrested, being foreign nationals on student visas, were deported from the U.S. in the same year or shortly afterward after paying fines or receiving suspended sentences. Deportation was standard practice in such cases. The harshest sentence was given to Kasum Adiguzelov (the organizer of the "zero level" mules), who received four years in prison, but he was an exception.
Kristina, who pleaded guilty on November 19, 2010, was only sentenced on June 24, 2013. Moreover, after the trial, not only did she remain in the U.S.—she graduated from NYU, and according to the press, actively used social networks to interact with an audience.
Something’s not right here
So, we’re getting to the main questions:
a) Where did Kristina get the money for studying at NYU if she was even appointed a public defender due to supposed lack of funds?
b) How did she, having a conviction for a serious crime, manage to continue her studies at NYU, especially as an international student?
c) If she really studied and graduated from NYU (which speaks to her motivation, character, and intellect), what could have motivated her to participate in clear-cut crimes involving forgery and theft?
g) Why did her trial last so long (2010–2013), and instead of a reasonable 40 years she received a lenient sentence (probation and a fine in 2013)?
d) Why did the amount of damages, according to the FBI, decrease from $220 million to $70 million, then to $30 million, and eventually down to $3 million in the USA and $11 million in the UK?
Of course, one might assume that Svechinskaya was recruited by FBI agents in order to reach the top of the criminal group, but that sounds more like a Hollywood movie plot. In real life, unfortunately, things are much more prosaic, and the facts speak for themselves—if you take a closer look at them.
So what really happened with Kristina Svechinskaya?
It's time to recall a 2004 computer science lecture by a professor at the Taganrog State University of Radio Engineering, which clearly showed what computers were for most people in the 2000s, including the media.
Computers were so complicated and confusing that even the best specialists from ten countries needed about three years to find Kasum Adiguzelov—a “zero level” money launderer who recruited students on a J-1 visa and consulted them on how to open dummy accounts, withdraw and transfer funds. Once they found him, naturally the FBI learned about the group of mules who, by October, were already preparing to leave the US. Given that time was working against law enforcement, the decision was made to “catch what you can,” realizing the “big fish” would get away. How many more Kasum Adiguzelovs were there in the US, and how many groups went through them, we’ll never know.
On the surface, everything looked spectacular: flashing lights, helicopters, FBI, SWAT, reporters, television. For journalists from the media (including CBS News, New York Post, Daily Mail, BBC, and others), whose understanding of cybercrime was at the level of “crackers, cookies, and spams,” this was a real Klondike. An unprecedented special operation, combined with Kristina Svechinskaya’s beautiful face, allowed them to sell stories effectively. The press attributed everything and anything to Kristina: studying IT at NYU, friendship with Anna Chapman, developing ZeuS, laundering $7 million...
The press made Svechinskaya the main figure in the most high-profile cybercrime of the time. And it suited everyone: the media profited from the sensation, the FBI could relax since the media noise drowned out the scale of their failure, and the public was happy to examine Kristina’s pretty photos without thinking twice that they’d been robbed twice (their taxpayer money didn’t even help the professionals get close to the ZeuS creators in three years). Nobody dug any deeper—why bother? “The sexiest Russian hacker stole $200 million.” That’s a good story.
But it was only beautiful until the trial. Judges in the US are very meticulous, and of course they demanded real facts and evidence from the prosecution. Where are the hackers? Where are the actual organizers? Where are the stolen $200 million that everyone had heard about? The prosecution, to put it mildly, looked very poor, because they could only prove that Kristina and others simply opened accounts for someone’s fraudulent scheme, not realizing what they had been tricked into participating in. It looked as if they were trying to convict someone who unknowingly agreed to help somebody carry a heavy bag of money. How were they supposed to know there was stolen money in that bag? Basically, the prosecution itself didn’t fully understand how the criminal scheme worked. The ZeuS case was falling apart and it was a real mess. The press didn’t write about this anymore, since everyone had made a mess of it.
That’s why the sentences were so lenient and the cases were hushed up. Kristina was kept under supervision until the attention around her died down, and her case was closed when the media had already forgotten about the “Russian hackers.”
Instead of a Foreword
Kristina was an ordinary girl who was lucky enough to come to the USA on a J-1 visa to earn some money. She was recruited through a “Work and Travel” group on VKontakte, where thousands of other students communicated. No one had ever seen the recruiter in person—an ideal setup. The recruiter supplied those who responded to the supposedly legal job of financial assistant with fake documents and instructions. Kristina didn’t live or study in New York; she only came there on weekends to open accounts from which money would later be withdrawn and transferred.
New York was a key transit point for international flights from Russia. Most likely, the recruiters instructed and controlled that the money should be withdrawn and transferred about a week before departure, which is why Kristina and 12 more people were in New York almost just before flying back home (out of 20 detained: 9—in New York, 1—near Pittsburgh, 3—earlier in New York, the remaining 7—in unknown locations in the US, most likely in New York).
In 2014, Kristina finally returned home, re-enrolled at North-Caucasus Federal University (formerly Stavropol State University) and graduated in 2017. In 2016, she appeared in a promotional presentation for the SmartFlash start-up (a secure cloud USB drive) on YouTube. This 52-second clip still circulates online, where Kristina’s accent is hard to miss.
The ZeuS case became one of the first major cybercrimes widely covered around the world and especially in the US, which fueled law enforcement’s desire to showcase success in fighting international cybercrime. At that time, however, even the best specialists weren’t ready to counter the hackers.
Even today, not everything about the ZeuS case is clear-cut. There’s little reliable information about the court cases against the organizers of the scheme Svechinskaya was involved in, since the key figures were either not apprehended in 2010 or their cases were handled much later.
Here’s what is known about the alleged organizers and their status:
Hamza Bendelladj (alias Bx1): arrested in Thailand in 2013 on suspicion of using ZeuS and SpyEye botnets. However, he only used the ZeuS source code for SpyEye and was not connected to the Svechinskaya case. The charges related to the ZeuS case were dropped.
Vyacheslav Penchukov (alias "tank"): one of the alleged leaders of the group using ZeuS. Arrested in Switzerland in 2022, extradited to the USA in 2023. Information about his trial is limited, and there is no confirmation that he was fully cooperative.
Evgeny Bogachev (aliases "lucky12345", "slavik"): considered the main developer of ZeuS. Wanted by the FBI since 2010 with a reward of 3 million dollars.
Other organizers and participants: the leaders of the scheme, presumably from Eastern Europe, were not arrested in 2010. The FBI reported that the operation on October 1, 2010, involved only 37 individuals, mostly mules, while the organizers remain at large, as does the question of the 70 million dollars stolen from accounts.
Write comment