您现在的位置: 纽约时报中英文网 >> 纽约时报中英文版 >> 商业 >> 正文

华尔街交易师与黑客勾结(英文)

更新时间:2015-8-12 21:09:23 来源:纽约时报中文网 作者:佚名

摘要:多名华尔街交易师被指控与乌克兰黑客合作,盗窃公司尚未发布的信息,借此在股市交易中获得先机。他们的合谋内部交易持续了五年,获利超1亿美元,直至周二他们被逮捕。

Federal authorities announced on Tuesday that they had broken up a five-year scheme in which rogue Wall Street traders gave overseas hackers a “shopping list” of confidential corporate news releases to steal, generating over $100 million in illegal profits from the buying and selling of securities.

The group traded based on confidential financial information from the stolen releases, which had not yet been made public, according to court documents.

The authorities filed criminal charges against nine people related to $30 million of illegal profits. Securities regulators also filed a complaint against them and 21 others. At least five men were arrested Tuesday morning, according to people briefed on the investigation who spoke on the condition of anonymity.

The unusual case, which links hacking with insider trading, is being brought by federal authorities in New Jersey and Brooklyn, who laid out the basics of the case on Tuesday morning. The Securities and Exchange Commission is bringing a parallel lawsuit.

The investigation has been active for several years, and federal agents began making arrests on Tuesday. At a news conference in Newark, top law enforcement officials, including Jeh Johnson, the secretary of homeland security, and Mary Jo White, the chairwoman of the Securities and Exchange Commission, spoke about the case.

Paul J. Fishman, the United States attorney for the district of New Jersey, said the hackers exercised great patience and determination in the scheme. He said some of them, based in Ukraine, would email instructions to the traders about how to reach the pilfered releases from an offshore server. One email even included a “how-to video.”

“This is the intersection of hacking and securities fraud,” he said. “The hackers were relentless and patient.”

In an indictment against five of the men, federal prosecutors in New Jersey said the men broke into companies like Business Wire and PR Newswire over five years to steal more than 150,000 news releases posted by publicly traded corporations before the information was released to the public. The men, some of them hackers in Eastern European countries and others in the United States who traded on the information, made at least tens of millions of dollars trading with the information, the indictment said. Another company whose releases were stolen was Marketwired, according to the indictment.

The stolen news releases gave rogue traders — four of whom were charged in a separate indictment unsealed on Tuesday by prosecutors in Brooklyn — a big advantage over others in the stock market by allowing them to trade on news before it hit the wires, authorities said. The men who used the stolen information to trade the stocks paid the hackers a flat fee or a percentage of the profits gained from the illegal trading, the S.E.C. said in a separate complaint.

The authorities said the traders looking for an illegal edge provided “shopping lists” to hackers for the kinds of news releases they wanted and the companies they targeted. The men obtained information from over 30 companies, including Bank of America, Clorox, Caterpillar and Honeywell, the authorities said.

“When we think of hackers who try to profit from their crimes, we usually think about people who steal bank account information or sell sensitive personally identifying information,” said Matthew L. Schwartz, a lawyer at Boies, Schiller & Flexner and a former prosecutor in Manhattan who worked on cases involving digital crime.

“The reality, as exemplified by today’s charges, is that hackers can obtain access to all sorts of valuable information and can and will profit off of it in every way imaginable,” he added.

In multiple instances in the current case, the men communicated via email and online chat messages, boldly stating what they were doing, the authorities said. At one point in 2012, for example, one of the defendants wrote in Russian in an online chat message, “I’m hacking prnewswire.com,” according to the indictment. In another instance, a defendant sent 96 stolen news releases to someone with a subject, in Russian, that read “fresh stuff.” The email said, “If he says he does not know what this is about, tell him ‘quarterly report,’” according to the indictment.

The authorities monitored some of the defendants for years, according to the indictment. In November 2012, it said, they seized the laptop of one of the hackers and found around 200 nonpublic news releases from PR Newswire.

The individuals charged in the New Jersey indictment with breaking into the newswire networks were Ivan Turchynov, Oleksandr Ieremenko, Arkadiy Dubovoy, Igor Dubovoy and Pavel Dubovoy.

The indictment unsealed by Brooklyn prosecutors named four men as the actual traders. They were identified as Vitaly Korchevsky, Vladislav Khalupsky, Leonid Momotok and Alexander Garkusha, all United States residents, who controlled brokerage accounts at some of the biggest investment banks in the United States, including JPMorgan, Merrill Lynch and Jefferies. Two of the four were registered with the S.E.C. One, Mr. Korchevsky, a former hedge fund manager, is a senior vice president of Investment Counselors of Maryland, according to his LinkedIn profile. He was also at one point a mutual fund manager at Morgan Stanley.

The charges against the men in the wire service “shopping list” case show the different ways that hackers are working with traders to game the markets, and they indicate that hackers are doing much more than looking to steal customer credit card information from retailers and banks.

Last month, prosecutors in Manhattan, for instance, filed charges against five people, some of whom are suspected of having had a role in the big breach at JPMorgan Chase last summer that resulted in the theft of customer contact information for 83 million accounts. The authorities suspect the group may have wanted to use the tens of millions of email addresses taken in the hacking to further stock manipulation schemes involving spam emails to pump up the price of otherwise worthless penny stocks.

The scheme was similar to one in 2005, when the S.E.C. charged a group of traders in Estonia with hacking into Business Wire to obtain news releases to inform their trades. Traders over the years have hacked or stolen corporate news releases to gain an illegal edge. But the scheme in the indictment on Tuesday is far broader than anything previously uncovered.

Last year, however, the computer consulting firm FireEye said that it had uncovered a sophisticated group of hackers, called Fin4, that was aiming at the email networks of large pharmaceutical and financial companies to gain market-sensitive information about deals. The revelation was outlined in a report that FireEye, based in California, shared with the S.E.C. and with the Federal Bureau of Investigation.

A few months ago, the S.E.C. asked a handful of companies to provide information about data taken in breaches of their computer networks. The authorities have also taken similar steps in the last few months with several large public relations firms, said another person briefed on the matter who spoke on the condition of anonymity.

“全文请访问纽约时报中文网,本文发表于纽约时报中文网(http://cn.nytimes.com),版权归纽约时报公司所有。任何单位及个人未经许可,不得擅自转载或翻译。订阅纽约时报中文网新闻电邮:http://nytcn.me/subscription/”

相关文章列表