CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. JABBERZEUS SUBJECTS
Back to CasesMore Cases
Multiple victims of identity theft and bank fraud

The person at the center of this case

Multiple victims of identity theft and bank fraud

Case
#634
SourceFBI WantedUpdated Mar 15, 2026
Russia and Ukraine (suspected locations of subjects)
Federal Bureau of Investigation (FBI); U.S. District Court, District of Nebraska
Cold Case · Open
48 days waiting

JABBERZEUS SUBJECTS

Justice for Multiple victims of identity theft and bank fraud — the trail went cold in 2026, but the truth hasn't.

Start here

Key leads to think about

🔍
evidence
Lead #1

How was the Zeus malware distributed and deployed across victim networks?

🎯
suspect
Lead #2

What specific individuals have been identified as leaders or key operators of the Jabberzeus racketeering enterprise?

💡
clue
Lead #3

What investigative techniques were used to trace the malware command and control infrastructure back to Russia and Ukraine?

A cybercriminal enterprise operating from Russia and Ukraine deployed the Zeus malware to infiltrate victims' computers and steal banking credentials, enabling unauthorized fund transfers from compromised accounts. Federal investigators identified multiple subjects involved in this wide-ranging racketeering scheme and secured indictments in Nebraska in August 2012. The case remains active as authorities continue efforts to locate and apprehend the fugitive subjects believed to be operating abroad.

Case
#634
SourceFBI WantedUpdated Mar 15, 2026
Russia and Ukraine (suspected locations of subjects)
Federal Bureau of Investigation (FBI); U.S. District Court, District of Nebraska

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

📞
contact
Lead #4

Have any of the fugitive subjects attempted to contact victims, launder proceeds, or access accounts since the 2012 indictment?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy to Participate in Racketeering Activity; Bank Fraud; Conspiracy to Violate the Computer Fraud and Abuse Act; Conspiracy to Violate the Identity Theft and Assumption Deterrence Act; Aggravated Identity Theft Caution: These individuals, thought to be located in Russia and Ukraine, are wanted for their involvement in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as “Zeus” on victims’ computers. The malicious software was used to capture bank account numbers, passwords, personal identification numbers, and other information necessary to log into online banking accounts.

These subjects were then able to coordinate unauthorized transfers of funds from victims’ accounts. These individuals were charged by a federal grand jury in the District of Nebraska in August of 2012 with Conspiracy to Participate in Racketeering Activity; Bank Fraud; Conspiracy to Violate the Computer Fraud and Abuse Act; Conspiracy to Violate the Identity Theft and Assumption Deterrence Act; and Aggravated Identity Theft.

Timeline of Events

🕵️
2012-08-01

Federal Grand Jury Indictment

Subjects charged in the District of Nebraska with conspiracy to participate in racketeering activity, bank fraud, computer fraud, identity theft, and aggravated identity theft related to Zeus malware distribution

Case Information

Incident:August 1, 2012
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:August 1, 2012
Last Updated:April 29, 2026