CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. IGOR OLEGOVICH TURASHEV
Back to CasesMore Cases
Tens of thousands of computer users and financial institutions

The person at the center of this case

Tens of thousands of computer users and financial institutions

Case
#928
SourceFBI WantedUpdated Mar 15, 2026
North America and Europe
Federal Bureau of Investigation (FBI) - Western District of Pennsylvania
Cold Case · Open
6 years waiting · since 2019

IGOR OLEGOVICH TURASHEV

Justice for Tens of thousands of computer users and financial institutions — the trail went cold in 2019, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

What is Turashev's current location and has he fled to a country without extradition treaties with the United States?

🔍
evidence
Lead #2

What specific roles did Turashev play in managing the botnet control panels and how many victim accounts did he directly compromise?

💡
clue
Lead #3

Are there remaining active components of the malware infrastructure that could still be traced back to Turashev or his associates?

Igor Olegovich Turashev is wanted for his role in a major cybercriminal conspiracy involving the Bugat/Cridex/Dridex malware, which infected tens of thousands of computers across North America and Europe and caused financial losses in the tens of millions of dollars. Turashev allegedly managed system administration, control panels, and botnet operations while the conspiracy used phishing emails to steal banking credentials and commit fraud. He remains at large since his indictment in November 2019, and locating him could help dismantle remaining infrastructure and recover stolen funds.

Case
#928
SourceFBI WantedUpdated Mar 15, 2026
North America and Europe
Federal Bureau of Investigation (FBI) - Western District of Pennsylvania

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

📞
contact
Lead #4

What financial institutions or payment processors may have been used to launder proceeds from the stolen banking credentials?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy; Conspiracy to Commit Fraud; Wire Fraud; Bank Fraud; Intentional Damage to a Computer Caution: Igor Olegovich Turashev is wanted for his involvement with computer malware which infected tens of thousands of computers, in both North America and Europe, resulting in financial losses in the tens of millions of dollars. Turashev allegedly handled a variety of responsibilities for the Bugat/Cridex/Dridex malware conspiracy including system administration, management of internal control panels, and oversight of the botnet operations.

He allegedly conspired to disseminate the malware through phishing emails, to use the malware to capture online banking credentials, and to use these captured credentials to steal money from the victims’ bank accounts. He, subsequently, used the malware to install ransomware on victims’ computers.

Turashev was indicted in the Western District of Pennsylvania, on November 13, 2019, and was charged with Conspiracy, Conspiracy to Commit Fraud, Wire Fraud, Bank Fraud, and Intentional Damage to a Computer.

Timeline of Events

🕵️
2019-11-13

Indictment filed

Igor Olegovich Turashev was indicted in the Western District of Pennsylvania on charges of Conspiracy, Conspiracy to Commit Fraud, Wire Fraud, Bank Fraud, and Intentional Damage to a Computer related to Bugat/Cridex/Dridex malware operations.

Case Information

Incident:November 13, 2019
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:November 13, 2019
Last Updated:April 29, 2026