Syrian Electronic Army: FBI Criminal Complaint
Syrian Electronic Army: FBI Criminal Complaint
Syrian Electronic Army: FBI Criminal Complaint
1030(b); (2) conspiracy to commit money laundering, in violation of Title 18, United States
Code, Section 1956(h); (3) conspiracy to commit wire fraud, in violation of Title 18, United
States Code, Section 1349; (4) conspiracy to violate the Syrian Sanctions Regulations, in
violation of Title 50, United States Code, Sections 1705(a) and (c); and (5) conspiracy to violate
multiple federal laws under Title 18, United States Code, Section 371, including 18 U.S.C. 880
(receiving the proceeds of extortion), and 18 U.S.C. 875(d) (sending an unlawful interstate
communication).
3.
As discussed in more detail below, defendants DARDAR and ROMAR are skilled
computer hackers who have worked on behalf of the Syrian Electronic Army (SEA), a group that
has been involved since at least in or about 2011 in a number of well-publicized computer
intrusions in support of the Syrian regime and to punish perceived detractors of Syrian president
Bashar al-Assad.
4.
In addition to those intrusions, the investigation has revealed that since at least in
or about late 2013, DARDAR and ROMAR have been involved in unlawful computer intrusions
for monetary gain through the targeting and compromising of computer systems located in the
United States and elsewhere, and extortion of victims, with DARDAR sometimes touting his
SEA affilation. In executing this scheme, DARDAR conducted computer intrusions from his
location in Syria and sent threats and demands for payment to each victim, and ROMAR, from
his location in Germany, received and attempted to retransmit the extortion proceeds to SEA
members in Syria, in violation of U.S. sanctions against Syria.
5.
The facts in this affidavit come from my personal observations, my training and
experience, information obtained from other agents and witnesses, and my examination of
reports, records, and other evidence. Because this affidavit is being submitted for the limited
purpose of establishing probable cause, it does not include all the facts that I have learned during
the course of my investigation. Where the contents of documents and the actions, statements,
and conversations of others are reported herein, they are reported in substance and in part, except
where otherwise indicated.
The Defendants
6.
As set forth in greater detail below, ROMAR controlled the email account
[email protected] and the Facebook, Inc. (Facebook) account pierre.romar1
(Facebook account ID number 100005382097823), and used those accounts in furtherance of the
criminal activities described herein:
A.
which ROMAR attached a scanned copy of his German passport, including the
photograph depicted above, as well as multiple emails containing photographs of
ROMAR, job applications for ROMAR, and outgoing correspondence signed by
ROMAR under his true name.
B.
addition to the fact that the user selected an account name that is a variation of ROMARs
alias (PIERRE ROMAR), subscriber information for the account confirms that the
account is controlled by the user of [email protected], namely ROMAR. As
discussed later in this affidavit, the contents of this Facebook account, obtained by a
court-authorized search warrant, further confirm that ROMAR controlled this account, as
the contents of communications with co-conspirator DARDAR over this Facebook
account are consistent with the contents of contemporaneous communications between
ROMARs [email protected] account and DARDARs accounts listed
below.1
Communications between ROMAR, DARDAR and an SEA hacker known as Th3 Pr0
(discussed in further detail in this affidavit), were usually conducted in Arabic, and I have
reviewed draft translations of those communications.
4
7.
an image of DARDAR:
As set forth in greater detail below, DARDAR controlled the email accounts
[email protected], [email protected], and [email protected], as well
as a Facebook account (ID number 100006770461994), all of which he used in furtherance of the
criminal activities described herein:
A.
his banking information (so that victims could send money to him as part of the extortion
scheme), which consistently listed his name as the beneficiary of the account.
B.
authorized search warrant confirms that this account was controlled by DARDAR.
Specifically, on or about January 7, 2015, the user of this account sent an email with an
attached signed contractual agreement in DARDARs name, as well as a copy of one of
the same official Syrian identification documents that DARDAR transmitted over his
[email protected] account. Further, the account contained communications
with hacking victims dated between in or about July 2014 to in or about January 2015, in
which the user of the account directed victims to transfer extortion payments to bank
accounts maintained under DARDARs name.
D.
account 100006770461994 registered it using the first name Sea and the last name
The-Shadow, a reference to DARDARs hacker pseudonym (THE SHADOW) and his
affiliation with the SEA. Further, as discussed below in this affidavit, the contents of
Facebook chats between ROMAR and Facebook account 100006770461994 confirm that
DARDAR controlled it, as the conversations discuss, and coincide with, activity seen in
ROMAR and DARDARs email communications.
PROBABLE CAUSE
Background to the SEAs Hacking Activities
8.
DARDAR, using the online alias THE SHADOW, and another Syrian hacker
known as Th3 Pr0 are notorious members of the Special Operations Division of the SEA, a
group of computer hackers responsible for computer intrusions intended to punish perceived
detractors of Bashar al-Assad, the president of Syria, and to publish pro-Assad propaganda.
9.
Among other computer intrusion methods they utilized, SEA hackers sent
phishing emails to victims that purported to come from a trusted source and that contained
hyperlinks to websites appearing to be trusted websites, but which actually were controlled by
the hackers.2 A recipient who clicked on these hyperlinks was directed to a conspiracycontrolled website that mimicked a legitimate, trusted website. The recipient was then asked for
credentials, such as a username and password, for access to the supposedly trusted website. In
the intrusion attacks that were successful, at least one recipient provided his or her credentials
when prompted, thus unknowingly providing those credentials to the hackers. The SEA hackers
then used the stolen credentials to obtain unauthorized access to the computer systems of the
target entity. Once these systems were accessed, SEA hackers would conduct a variety of
malicious activities, including but not limited to redirecting legitimate Internet traffic, defacing
Phishing is the act of attempting to acquire information, such as usernames and passwords,
by masquerading as a trustworthy entity in an electronic communications. Spearphishing
consists of phishing attempts directed at specific individuals or companies. Attackers may
gather personal information about their target to increase their likelihood of success.
7
and altering website text, sending messages using the victims accounts, and conducting further
phishing attempts.
10.
DARDAR and Th3 Pr0 on behalf of the SEA included: Harvard University, the Washington
Post, the White House, Reuters, Human Rights Watch, National Public Radio, the Associated
Press, CNN, The Onion, NBC Universal, Inc., USA Today, the New York Post, the National
Aeronautics and Space Administration (NASA), and the Microsoft Corporation.
ROMAR Affiliates with the SEA
11.
As a result of the SEAs hacking activities, DARDAR and Th3 Pr0 gained
notoriety under their online hacker pseudonyms. In or about April 2013, ROMAR contacted Th3
Pr0 via Facebook regarding ROMARs attempts to affiliate himself with the SEA. Search
warrant returns from ROMARs Facebook account indicate that between on or about April 11,
2013, and April 28, 2013, ROMAR engaged in a conversation with a Facebook account used by
Th3 Pr0 (Facebook account 100005539625632, vanity name Th3Pro.Net.Sy, registered to
ViVa ThePro). In this conversation, ROMAR indicated that he had reached out to Th3 Pr0
approximately five months previously about working with [him] and noted that he had
provided Th3 Pr0 with information about computer intrusions that ROMAR had conducted in the
past (stating that he had provided a record of [his] hackings). ROMAR asked Th3 Pr0 for
assistance with a cyberattack that ROMAR was planning against entities located in Saudi Arabia,
Turkey, and Qatar.
12.
operations, Th3 Pr0 arranged an introduction between DARDAR and ROMAR. Search warrant
returns from [email protected] indicate that on or about April 28, 2013, Th3 Pr0
provided DARDAR with the website URL3 for ROMARs Facebook account
(www.facebook.com/pierre.romar1) and instructed DARDAR to [h]elp him, whatever he
needs. On or about April 29, 2013, Th3 Pr0 directed ROMAR to contact DARDAR for
assistance, providing ROMAR with the URL of DARDARs Facebook account
(www.facebook.com/SEA.Th3.Shad0w). Later that day, DARDAR added ROMAR as a
Facebook friend.
Overview of DARDAR and ROMARs Hacking and Extortion Scheme
13.
Starting in at least approximately late 2013, DARDAR began using his computer
hacking skills and notoriety as an SEA hacker to expand the goal of his activities beyond support
of the Syrian regime, to personal monetary gain through computer intrusion and extortion
schemes. As described in detail below, DARDAR committed unlawful computer intrusions into
private companies in the United States and elsewhere and, in at least one instance, used his
notoriety and affiliation with the SEA to instill fear in victim companies and extort money from
them. Further, ROMAR played an important role in the scheme by helping to transmit the
extortion proceeds from victim companies to Syria, which was necessary because DARDAR had
difficulty obtaining funds directly as a result of U.S. and other countries sanctions against Syria.
ROMAR did so with the knowledge that he was receiving funds from the victims of DARDARs
hacking activities and that he was assisting DARDAR in evading the relevant sanctions.
14.
Based upon, among other things, a review of the contents of email and Facebook
accounts used by ROMAR and DARDAR, information provided by victims of the scheme, and
other documentary evidence, the investigation has identified at least approximately 14 different
URL stands for Uniform Resource Locator, which is a protocol for specifying addresses on
the Internet. It is an address that identifies a particular file on the Internet and usually consists of
the protocol, typically represented as http, followed by the website domain name.
9
U.S. and international victims of the extortion scheme between in or about July 2013 and in or
about December 2014. DARDAR demanded in total more than $500,000 from those 14 victims
as part of the extortion element of the scheme, although ROMAR and DARDAR accepted
smaller amounts in many circumstances. The details uncovered by the investigation regarding
seven of the victims are discussed in detail below.
The Unlawful Objects of the Conspiracy
15.
transactions described herein, DARDAR and ROMAR violated multiple U.S. criminal statutes.
Those statutes include:
A.
intrusions in violation of the Computer Fraud and Abuse Act (CFAA), with the unlawful
objects of: (i) unauthorized access of a computer and obtaining information (18 U.S.C.
1030(a)(2)); (ii) unauthorized access of a computer to defraud and obtain value (18
U.S.C. 1030(a)(4)); (iii) causing unauthorized damage to a computer (18 U.S.C.
1030(a)(5)); and (iv) transmitting extortionate threats relating to damaging a computer
(18 U.S.C. 1030(a)(7));
B.
unlawful objects of: (i) promoting the carrying on of a specified illegal activity (18
U.S.C. 1956(a)(1)(A)(i)); (ii) concealing or disguising the nature of the proceeds of the
specified unlawful activity (18 U.S.C. 1956(a)(1)(B)(i)); and (iii) promoting the
carrying on of a specified illegal activity through the transmission or transfer of funds
from a place in the United States to or through a place outside the United States (18
U.S.C. 1956(a)(2)(A));
10
C.
D.
18 U.S.C. 371: conspiracy with the unlawful objects of: (i) receiving the
proceeds of extortion (18 U.S.C. 880), and (ii) sending an unlawful interstate
communication (18 U.S.C. 875(d)).
Manner and Means of the Conspiracy
16.
Some of the methods of the Conspiracy for infiltrating computer systems and
asked for login credentials, such as their username and password, for their
accounts on legitimate computer systems. For the attacks that were successful, at
least one recipient was deceived into providing his or her credentials to the
Conspiracy.
11
iv)
the Conspiracy would redirect legitimate Internet traffic to or from the victims systems,
deface and alter website text, send messages using the victims accounts, attempt further
phishing attempts, exfiltrate data, or engage in other illegitimate activities.
C.
DARDAR would then send emails from one of his above-listed personal
accounts to employees of the victim entities that indicated his responsibility for the hack
and provided proof of the system compromise. DARDAR would then demand payments
from the victim and make threats about what would happen if payment was not received,
including threats that he would cause further damage to the victims systems, or sell
information stolen from the victim to other hackers.
D.
ROMAR, who resides in Germany, would receive funds from victims who
could not transmit money directly to DARDAR and other conspirators in Syria due to the
sanctions against Syria, all with the knowledge that he was receiving funds from the
victims of his co-conspirators hacking activities and that he was assisting DARDAR and
other conspirators in Syria in evading the relevant sanctions.
Extortion Attempts and Overt Acts
17.
and, in furtherance of the Conspiracy, at least the following overt acts, with at least one overt act
occurring in the Eastern District of Virginia (see Paragraph 45 below):
12
I.
systems of VICTIM 1, a Chinese online gaming company, which operates its online services
from U.S.-based servers. On or about July 24, 2013, DARDAR, using the
[email protected] account, sent several emails to employees of VICTIM 1 in which he
informed the recipients in sum and substance that he had hacked one of its games, and demanded
payment. DARDAR threatened VICTIM 1 in the course of his demands and noted, in an email
dated on or about July 24, 2013, that [t]his is the last warning / communicate with me or / I will
did [sic] something you do not like.
19.
Email correspondence reveals that VICTIM 1 made its first payment of $500 to
DARDAR via Perfect Money4 shortly thereafter. Following that payment, DARDAR regularly
sent emails to representatives of VICTIM 1 claiming to have identified other vulnerabilities in
VICTIM 1s servers for which he extracted additional payments or gaming privileges.
20.
informed DARDAR that his information regarding additional vulnerabilities was proving to be
of little value. DARDAR responded by indicating that he had access to all of VICTIM 1s
databases (i have Access on everything and i have everything) and demanded 50,000 in
exchange for the databases. VICTIM 1 confirmed that DARDAR had indeed accessed its
systems, but attempted to get DARDAR to agree to installment payments of 1,333 rather than a
large, one-time sum. DARDAR rejected the proposal, noting that he had compromised VICTIM
1s server for a long period of time (in your server from 3 month . . .work inside your server is
Perfect Money is an online e-commerce payment system, which allows users to transmit funds
online.
13
easyer [sic] than out of it), and he threatened to cause damage to VICTIM 1 (do every thing
can [sic] to hurt you.). DARDAR eventually lowered his extortionate demand to 15,000.
21.
Over the course of the next five months, DARDAR sent additional messages to
computer systems of VICTIM 2, a U.K.-based web hosting company. On or about October 20,
2013, DARDAR, referring to himself as Shadow, his SEA hacker pseudonym, sent an email
from [email protected] to a representative of VICTIM 2 in which he claimed to be an
ethical hacker and requested payment of 50,000 for assisting VICTIM 2 in avoiding future
hacks. Further, DARDAR threatened to use VICTIM 2s servers to conduct unlawful computer
intrusions on other victim systems if VICTIM 2 did not comply with his demands for payment.
24.
proceeds of the extortion of VICTIM 2 as a result of sanctions against Syria. Specifically, e-mail
correspondence between DARDAR and representatives of VICTIM 2 indicate that they settled
on a payment of 15,000 to satisfy DARDARs demands. DARDAR sent a photograph of his
14
banking information to Victim 2, which listed his name (FIRAS DARDAR) as the beneficiary
of the account. However, when VICTIM 2 attempted to send DARDAR the payment via an
American Express international payment system, the transaction was rejected because the
beneficiary bank was in Syria. An employee of VICTIM 2 informed DARDAR that the payment
transaction had been rejected and indicated that [t]he us has a trade imbargo [sic] . . . .
25.
apparently managed to obtain a total of at least approximately 16,000 from VICTIM 2 through
payments made from the United Kingdom directly to Syria.
III.
belonging to a Europe-based web hosting company (VICTIM 3), and a dedicated server and web
hosting company based in California (VICTIM 4). As detailed below, DARDAR enlisted
ROMARs assistance to transmit the proceeds of extorting both VICTIM 3 and VICTIM 4 to
Syria.
27.
employees of VICTIM 3 from his [email protected] account, and informed them that
he had hacked [VICTIM 3s] websites servers and databases and downloaded it all.
DARDAR provided images to prove that he had successfully compromised the companys
systems, and noted that he had two buyers who would each pay 150,000 for the stolen data.
Further, DARDAR demanded 300,000 in exchange for refraining from further attacks and
releasing valuable information obtained during the penetration, and for a report on how he
executed the attack.
15
28.
to negotiate a lower price. After DARDAR made threats of further intrusions, damage, and that
he would sell VICTIM 3s data, VICTIM 3 informed DARDAR that its bank would not process
payments directly or indirectly to Syria due to sanctions against the country.
29.
The next day, on or about November 28, 2013, a representative of VICTIM 4 sent
an email to DARDAR and asked what they could do to convince DARDAR to relinquish control
over the re-directed domains. DARDAR responded and demanded that 100,000 be deposited
into his bank account and an additional 5,000 be sent to him via Perfect Money. DARDAR
threatened to sell information regarding vulnerabilities in VICTIM 4s systems to other hackers
16
if the company failed to comply with his demands.5 On or about December 6, 2013, the
representative of VICTIM 4 informed DARDAR by email that VICTIM 4s bank was giving
[VICTIM 4] a hard time sending money to DARDAR in Syria, but that he was investigating
other forms of electronic payment systems to provide funds to DARDAR, including PayPal,6
Bitcoin, and Webmoney. DARDAR replied that none of those payment systems were available
to him in Syria.
31.
On or about December 15, 2013, DARDAR enlisted ROMAR to assist him with
receiving the proceeds of the extortion scheme from VICTIM 3 and VICTIM 4, because he was
having trouble receiving the funds in Syria. Specifically, DARDAR raised the issue with
ROMAR over Facebook, informing ROMAR that he needed assistance in transferring money
because it was stuck in [European location of VICTIM 3] and America. DARDAR further
stated that he was receiving payments as a result of computer hacking activities, explicitly noting
that he had hacked VICTIM 3. DARDAR indicated that if he did not receive payment from
VICTIM 3, he would declare a war on them. ROMAR responded in part by agreeing to assist
DARDAR with the transfer of funds, and DARDAR told ROMAR to expect about 1450
Euros.
32.
As discussed below, on the same day that ROMAR agreed to help DARDAR
receive the proceeds of extortion from VICTIM 3 and VICTIM 4, DARDAR reached out to
representatives of both VICTIM 3 and VICTIM 4 and made arrangements to have the extortion
payments made through ROMAR in Germany.
PayPal is an online payment system which provides users with the ability to transfer funds
electronically between individuals and businesses.
17
33.
please send the money to Peter Romar[ ]in Germany via western union. On or about
December 20, 2013, after receiving no reply from VICTIM 3, DARDAR responded with threats
in an email entitled important I hacked your servers:
I will take your not responding is a breach of the Convention
So I have the right to do what I want with the information
I did to you a favor and you have to pay it back
or i will take it by my self
As you know, we ( Ethical Hackers ) have a reputation and we must
maintain it
, I did not took [sic] much time to hack your servers
But I assure you I will provide plenty of time to I [sic] recover my right
Note:
You have one day to respond
If you do not respond
....... ?? :)
VICTIM 3 responded by indicating its willingness to pay DARDAR, but that it had earlier
indicated that it required a signed contract, accompanied by a copy of the signatorys passport,
before it would process any payments. On or about December 27, 2013, DARDAR responded
that his friend would send the required contract.
34.
payment from VICTIM 3, DARDAR forwarded ROMAR an email with no new text, but which
included in the email chain the text of the email quoted above in paragraph 33, entitled
important I hacked your servers. Accordingly, based on my training and experience, and my
familiarity with this investigation, I believe that ROMAR had access to the entirety of the email
18
chain and was aware of the specific threats that DARDAR made regarding VICTIM 3s
computer systems if VICTIM 3 did not comply with making extortion payments through
ROMAR.
36.
Between on or about January 3, 2014, and on or about March 24, 2014, DARDAR
and the CEO of VICTIM 3 exchanged emails pertaining to: (a) the status of the signed contracts
and their delivery from ROMAR in Germany to VICTIM 3s offices in Europe; and
(b) DARDARs possession of an image of the CEOs passport, which DARDAR claimed to have
obtained as a result of hacking into the CEOs email account. DARDAR demanded an
additional 50,000 from VICTIM 3 in exchange for information concerning how he obtained the
image of the CEOs passport.
37.
A February 18, 2014 email from VICTIM 3 to DARDAR indicates that VICTIM
3s bank refused to send money to ROMAR because of ROMARs Syrian nationality. VICTIM
3 offered to open a new account at a bank that would not have issues with ROMARs nationality
and asked DARDAR to reduce the extortion payment of 5,000 in an effort to reduce difficulties
with the new bank. DARDAR agreed.
38.
and asked him to arrange for ROMAR to sign a nondisclosure agreement. DARDAR forwarded
the agreement to ROMAR by email and stated as follows:
He wants you to sign this contact to protect the secrecy of the
information
Read it and if there is something you dont agree on let me know
You have to sign the two pages, scan them and send them to me.
39.
40.
On or about April 22, 2014, VICTIM 3 emailed DARDAR and informed him that
it had received confirmation that 5,000 was sent to the German bank account.
41.
representative of VICTIM 4 had informed DARDAR, in sum and substance, that VICTIM 4s
bank would not allow it to send funds to DARDAR in Syria. On or about December 15, 2013,
DARDAR sent an email to the representative of VICTIM 4 and instructed him to send the money
to Peter Romar in Germany. Approximately four days later, on or about December 19, 2013,
the representative of VICTIM 4 replied and indicated that he would send the funds through
Western Union. In subsequent correspondence, the representative from VICTIM 4 indicated that
approximately $1,500 was sent, and requested confirmation of receipt.
42.
correspondence with VICTIM 4 regarding the Western Union payment from his
[email protected] account to ROMAR at [email protected]. As part of
that email, DARDAR instructed ROMAR to transmit 1450 to SEA hacker Th3 Pr0 (1450 EUR
/ /Send it to / [Th3 Pr0s real name]).
43.
Also on or about December 25, 2013, ROMAR and DARDAR had discussions
using their respective Facebook accounts identified above, which covered the same topics,
including: (1) identifying the name of the executive from VICTIM 4 who was responsible for
sending the Western Union payment; and (2) verifying that funds should be transmitted to Th3
Pr0 in Syria.
44.
Records obtained from Western Union confirm that on or about December 27,
2013, ROMAR received a Western Union payment from VICTIM 4 of approximately $1,500,
before fees. ROMAR simultaneously communicated with DARDAR using Facebook and
20
informed DARDAR that he had forwarded the amount left after fees to an intermediary in
Lebanon, whom ROMAR had instructed to forward the money to Th3 Pr0. ROMAR further
indicated that he had to use this circuitous route because his local Western Union office would
not forward the money directly to Syria due to new law. Prior Facebook conversations
between DARDAR and ROMAR, which occurred no later than December 15, 2013, indicate that
ROMAR was aware of sanctions against Syria, and that those sanctions prevented German banks
from wiring money to Syrian banks.
IV.
47.
On or about March 19, 2014, after not receiving the demanded payment from
VICTIM 5, DARDAR followed through with his threats. DARDAR used the stolen VICTIM 5
customer email lists to distribute spam emails to thousands of VICTIM 5s customers. These
emails advertised the sale of VICTIM 5s databases hacked by ethical spectrum for 5000.
According to representatives of VICTIM 5, the incident cost the company tens of thousands of
dollars, but VICTIM 5 never made any extortion payments to DARDAR.
V.
belonging to an online entertainment service that has offices in the United States and elsewhere
(VICTIM 6). Specifically, on or about May 21, 2014, VICTIM 6 employees received
spearphishing emails that appeared to be from its CEO with a purported hyperlink to a news
article regarding VICTIM 6, but which instead directed recipients to a Conspiracy-controlled
22
website that mimicked the log-in portal for VICTIM 6s email system. At least one recipient
clicked on the embedded hyperlink and, when prompted by the fake log-in portal, entered valid
credentials. DARDAR subsequently started receiving emails in his [email protected]
account that contained what appeared to be credentials for VICTIM 6 employees, thereby
indicating that some VICTIM 6 employees had clicked on the hyperlink and been deceived into
entering their credentials. DARDAR used the information to change the settings of the affected
accounts in order to divert some employees emails to the email account
[email protected] For example, DARDAR received an email containing the
login information for one VICTIM 6 employee; four minutes later he received an email from
VICTIM 6s email service provider indicating that the purported employee had requested to
automatically forward email to [email protected]. According to interviews of
VICTIM 6 employees, valuable data was exfiltrated from VICTIM 6s servers as a result of the
intrusion.
50.
23
Over the next few days, DARDAR and several VICTIM 6 employees exchanged
multiple emails regarding payment to Syria. In one email dated on or about May 26, 2014,
DARDAR indicated that if there was a problem transferring money to Syria, then VICTIM 6
could send the money to ROMAR in Germany. DARDAR attached a photograph of the back of
ROMARs bank card, which included information regarding ROMARs account.
24
53.
DARDAR because doing so would violate U.S. sanctions against Syria. DARDAR responded
by issuing further threats against VICTIM 6, including: [W]hat do you expect me to do now[?]
[smiley face] [D]o you know what I have [--] info about your company?
54.
company.
VI.
servers of a Switzerland-based web hosting service (VICTIM 7). On or about July 26, 2014,
DARDAR sent an email from his [email protected] account to several VICTIM 7
employees containing what appeared to be an employees username and password as proof of the
infiltration, and indicated that I can help you to avoid this hack again but I want fees in return.
56.
The next day, on or about July 27, 2014, DARDAR and representatives of
VICTIM 7 negotiated over email a price of 5,000 in exchange for a report on how DARDAR
perpetrated the attack. DARDAR instructed VICTIM 7 to send the money to ROMARs PayPal
account and described ROMAR as my partner and he [is] responsible for receiving money and
sent me only [sic]. On or about July 27, 2014, VICTIM 7 sent DARDAR an email with an
attached scan of a statement indicating that it was sending money to ROMARs PayPal account
in exchange for ethical penetration testing received. Based on my training and experience, and
my familiarity with this investigation, I believe that DARDAR would, in some instances, include
such statements in his contracts (or ask that the victim include them) in order to provide his
extortionate activities with a false veneer of legitimacy. DARDAR forwarded the agreement to
ROMAR by email.
25