Gov Uscourts FLSD 672601 1 0
Gov Uscourts FLSD 672601 1 0
MP
UNITED STATES DISTRICT COURT
Aug 6, 2024
for the
Middle District of Florida Miami
ARREST WARRANT
To: Any authorized law enforcement officer
YOU ARE COMMANDED to arrest and bring before a United States magistrate judge without unnecessary delay
(name ofperson to be arrested)
------------------------------------
Pavel Kublitskii
who is accused of an offense or violation based on the following document filed with the court:
Date: 07/22/2024
'1ss,,�·s signature
Return
This warrant was received on (date) ------- , and the person was arrested on (date)
at (city and state)
Date:
Arresting officer's signature
CRIMINAL COMPLAINT
I, the complainant in this case, state that the following is true to the best ofmy knowledge and belief
On or about the date(s) of August 29, 2017-present in the county of Hillsborough in the
Middle F_lo_r i_da_ ___ , the defendant(s) violated:
District of ____
See Affidavit.
Co111plai11w11 ·s sig11a111re
AFFIDAVIT IN SUPPORT OF
APPLICATION FOR COMPLAINT
I, Gregory T. Christopher, being duly sworn, depose and state the following:
Investigation ("FBI") and have been employed in this capacity since March of 2006.
Prior to becoming a Special Agent, I served as an officer in the United States Marine
Corps for approximately six years. During my time in the United States Marine
Operation Enduring Freedom. I am currently assigned to the FBI Tampa field office
in Tampa, Florida.
intrusions, intellectual property rights, mail and wire fraud, and money laundering.
contact with law enforcement personnel who specialize in the area of cybercrime and
criminal enterprises.
the United States and am a law enforcement officer with the authority to execute
search and arrest warrants issued under the authority of the United States.
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 4 of 35
probable cause for the requested complaint and arrest warrants, I have not included
all aspects ofthe investigation, but rather only information sufficient to establish
circulated over the Internet as substitutes for traditional fiat currency. Virtual
currencies are not issued by any government or bank like traditional fiat currencies,
such as the U.S. dollar, but rather are generated and controlled through computer
virtual locations to or from which such currencies are sent and received. A virtual
8. Blockchain: The code behind many virtual currencies requires that all
updated multiple times per hour and records every virtual currency address that has
ever received that virtual currency and maintains records of every transaction and all
the known balances for each virtual currency address. There are different blockchains
platforms for virtual currencies, such as Bitcoin. Many VCEs also store their
customers' virtual currency in virtual currency wallets. These wallets can hold
alphanumeric strings and timestamps. That said, law enforcement agents can obtain
leads regarding the identity of the owner of an address by analyzing blockchain data
to figure out whether that same individual is connected to other relevant addresses
on the blockchain. To do so, law enforcement can use blockchain explorers, as well
These companies analyze virtual currency blockchains and attempt to identify the
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 6 of 35
creates multiple [Bitcoin] addresses, it will often combine its [Bitcoin] addresses into
can be used to analyze a transaction." United States v. Gratkowski, 964 F.3d 307, 309
(5th Cir. 2020). Through numerous unrelated investigations, law enforcement has
12. Dark net Idark web is the hidden collective of internet sites only accessible
by a specialized web browser. It is used for keeping internet activity anonymous and
private, which can be helpful in both legal and illegal applications. While some use it
to evade government censorship, it has also been known to be utilized for highly
illegal activity.
13. Surface web/ clear web is the portion of the World Wide Web that is
readily available to the general public and searchable with standard web search
engines.
14. Carding is a form of credit card fraud in which a stolen credit card is
used to charge prepaid cards. Card forums are online shopping venues for stolen
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 7 of 35
credit and debit card information and criminal techniques. Carding is a third-party
limited information from a web browser session on a given website that can then be
retrieved in the future. Common use cases for cookies include session management,
marketplace-like a cross between Ebay and Reddit-that exists for the sole purpose
facets of the criminal underground and use the WWH platform to work together
towards a common goal of generating ill-gotten gains. WWH members use the
platform as a marketplace (like Ebay) where they communicate privately to buy, sell,
and trade goods and services that are typical tools of the trade for cybercrime,
forum features of the site (like Reddit) to promote themselves and the illegal goods
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 8 of 35
and services they can provide, as illustrated further below. Finally, WWH also
provides online courses to train members on how to commit various crimes. In other
words, WWH members conspire with, aid and abet, and train one and other in the
commission of cybercrimes, including, but not limited to, wire fraud, access device
19. In or around July 2020, FBI agents determined that WWH's main
investigators with a copy of the server used to run WWH. The data from
posts on WWH, as well as the transactions conducted via the site. The information
from DigitalOcean made clear that the sole purpose and intent of WWH was to
scientists configured the data to enable investigators to view a copy of the forum as
one with administrator access would have viewed it (the reconstructed server will
so investigators used the Google Translate function of Google Chrome to view and
read the site. 1
Examination of the Backend Database
22. Using the data provided by DigitalOcean, FBI computer scientists also
reconstructed the site's SQL 2 databases and other stored information regarding the
the Marketplace. That data-referred hereinafter as the "backend database"-was
aggregated into a single searchable dataset. This dataset includes:
a. Email addresses registered to user accounts;
b. Registration dates for user accounts;
c. Secret word and password associated with accounts;
d. Privilege level of user (admin/moderator/staff/none); and
e. User activity, such as posts and messages.
23. Based on information obtained from the backend database, it appeared
the Marketplace had nearly 170,000 registered users as of July 2020. Of the
approximately 170,000 accounts, approximately 29 were assigned "moderator"
privileges; 32 were assigned "staff" privileges; and 7 were assigned "admin"
privileges. Based on the facts below, there is probable cause to believe that
KUBLITSKII and KHODYREV are two of those administrators, and that
1
Quotations included in this affidavit from the Marketplace and the current WWH Club
forum are written in English as translated from the original Russian by Google Translate.
2
A structured query language ("SQL") is a tool for connecting to many database systems
that store data in tables organized into rows and columns. It is often used on the backend of
business websites to provide access to user data.
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 10 of 35
administrators (those with "admin" privileges) are the owners and creators of the site
who determine the Marketplace's rules and regulations. The administrators also
operate the Marketplace. Meanwhile, moderators oversee posts and chats on the
administrators to ensure compliance. Users who disregard the rules are assigned a
number of points for each infraction; users who accumulate too many points are
banned from the site. The forum rules include topics such as Marketplace fees,
communication restrictions.
26. In addition, the Marketplace rules forbid site users from conducting any
countries such as Russia (the home nation ofKUBLITSKII), Kazakhstan (the home
27. In March 2016, the owner ofWWH posted a message to all members
that the forum's server architecture was designed to operate off compromised
site operational in the event law enforcement attempted to disrupt and dismantle the
ongoing criminal activity. Thus, it is clear to me that the owners and administrators
of the forum were aware they were involved in criminal activity, and they took active
28. As of July 2020 (i.e. the date of the most recent capture of the WWH
server, via the image provided by DigitalOcean), WWH was available on one
darknet domain (wwh-club. ws) and four surface web domains. The sites are mirrors of
each other, in that each URL leads users to replica sites that appear to be identical to
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 12 of 35
all of the other sites. Mirror sites are exact copies of a website that are placed at
different URLs or domains. Mirror sites can be used for innocuous reasons, like
reducing server traffic. Criminals also may use mirror sites to facilitate uninterrupted
access to a particular site in the event that one of the site's domains is shut down.
29. After accessing WWH (whether through the surface web or darknet),
the first thing a user sees is the homepage, which contains flashing banners
advertising various criminal services and other darknet marketplaces. Each image
contains a link to the associated post (or "thread"), which contains details about the
3
Based on my training, experience, and knowledge of this investigation, I believe "BOA" to
be a reference to Bank of America.
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 13 of 35
and my investigation to date in this case, I know that stolen PII is often used to
commit a variety of crimes, including U.S. tax fraud, credit card fraud,
unemployment insurance fraud, bank fraud, and stolen identity refund fraud.
32. The Marketplace also advertised that WWH offered its users training in
how to commit credit card fraud via a banner that stated, "Quick start in shady
services. From my knowledge and experience, I know that SMS- and phone-flooding
sending a large volume of calls or texts to the phone. This DDoS attack is done in
phone alerts from their financial institutions notifying them of the crimes in progress.
4
Other advertisements on the site pointed WWH's users towards other avenues for criminal
activity. For example, a large banner advertised a darknet marketplace called Joker's Stash.
The advertisement stated that Joker's Stash was "The Biggest Darknet Marketplace." It also
boasted that Joker's Stash had "Millions of CC+CVV, Dumps, SSN+DOB" and "Every
Day Updates." From my knowledge and experience, I know that Joker's Stash was another
large and well-known darknet market, like WWH, that sold stolen credit card information
("CC+CVV") and PII obtained during large-scale computer intrusions. After purchasing the
stolen data through Joker's Stash, criminals used the data to conduct fraudulent
transactions, just like on WWH.
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 14 of 35
34. At the top of each Marketplace page, there was a header with links that
connected users to additional Marketplace pages. The main page was the "forum,"
and other pages had titles such as "members," "forum rules," "advertising," "duty,"
35. The forum page included a list of Marketplace users that could be
filtered. Each message displayed a title, date, and the user who submitted the
message. Numerous messages were posted every day, and a review of message titles
revealed that all of the reviewed titles pertained to some form of criminal activity.
type. For example, there were sections titled "Our Projects," "All About Carding,"
assist individuals in using stolen credit card information and PII to make purchases
and generate revenue. There was also information regarding online security,
38. The "Trading Area" provided links to forum posts organized by topic.
Such topics included hacking services, the sale of email databases, access to
posts and approximately two million views. On the forum, users could apply for
41. The advertised cost of the Marketplace course was 60,000 rubles
(approximately $775 U.S. dollars), with an additional $200 necessary for training
2014. Between the first post and in or around July 2020, there were approximately
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 16 of 35
training) and individual users (who attended classes). Some of the student posts
included a review of the training received, and others provided information and
pictures regarding the students' personal success in using the training to commit
fraud.
multiple lectures titled, "Public training manual V 3.0 WWH-CLUB 2019." The
enforcement and evade antifraud systems. There were also lectures on the best
methods to conduct carding, such as which type of stolen credit card numbers to use,
how to adapt to the purchasing habits of the actual cardholder, and how to find
shops that are most susceptible to carding. For those who successfully purchased
items with stolen credit card data, the training manual provided instruction on using
who made posts regarding certain topics on the forum and/ or who wished to
participate in a training. The site provided a lengthy list of specific fees for
approximately 35 "commercial topic[s]." The list included topics such as the sale of
credit card information, PII, compromised bank accounts and debit cards; the sale of
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 17 of 35
services such as DDoS and hacking; and the sale of software and equipment such as
credit card skimmers, scripts, and brute force programs.The fees appeared to range
45. To assure members that posting on the Marketplace forum was worth
the mandatory fees, one of the site administrators (username: "Reklama," which is
An administrator subsequently updated the 2020 post to indicate that the total
number of members was 160,000 at that time, which aligns with the data FBI
March 26, 2023, the Reklama administrator posted that the forum had grown to
46. The Reklama administrator also advertised onWWH that the owners
administrators told a user, "Done, the link from you was only required for approval.
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 18 of 35
Above, I wrote you full instructions on the topics. You can also stay on the sites
additional sites revealed they appear similar to WWH in layout and content, and the
47. On or about July 19, 2024, an FBI agent logged on to WWH and
confirmed that WWH still generally looks and operates as described above. In other
48. In January 2023, an FBI online covert employee ("OCE-1"), who was
physically located in the Middle District of Florida at the time, registered for an
43. The training was conducted through a chat function on the forum to a class of
rather than audible instruction. The lectures were consistent with the aforementioned
topics described in the WWH training manual, and it was apparent the purpose of
the training was to educate individuals on how to obtain and use stolen credit card
tools and services advertised on WWH that would assist users in conducting criminal
activity. After approximately six weeks of lectures, OCE-1 completed the training
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 19 of 35
and was provided several promotional products by WWH that would assist students
user was selling stolen PII of United States persons and businesses. Buyers could
choose how many people's PII they wished to buy and specify the particular U.S.
state of residence, gender, age, and credit score of their desired victims. OCE-1
contacted the seller and arranged to purchase PII belonging to 20 victims located in
Florida in exchange for $110, paid in Bitcoin. The WWH seller sent OCE-1 a folder
containing 20 files, each of which contained the name, date of birth, Social Security
number, state of residency, address, credit score, credit report, and account
information from LendingTree.com for a United States person. All 20 of the victims
had addresses in Florida, 13 of the victims had addresses in the Middle District of
account information from LendingTree.com suggests that this stolen PII derived
from a February 2022 breach of LendingTree that compromised the data of over
200,000 customers.
investigation has largely focused on identifying the owner of WWH and those
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 20 of 35
54. To date, investigators have determined that the owner and creator of
the forum has two usemames with administrative functions: "W. W.H" and
"Mans77." In addition to the forum owner and creator, it appears there are several
other top administrators who operate the site and receive a portion of the generated
revenue. One of those top administrators operates under the usemame "Makein." For
the reasons described below, there is probable cause to believe that KUBLITSKII
and KHODYREV both serve as administrators of WWH and share the Makein
usemame.
55. On April 29, 2021, a United States Magistrate Judge sitting in the
1335 (TBS). Based on the information gathered from those warrants, on July 25,
2023, a different United States Magistrate Judge sitting in the MDFL authorized four
follow-up federal search warrants covering 25 more email accounts associated with
the main WWH Club administrators. See 8:23-mj-18 (SPF); 8:23-mj-19 (SPF); 8:23-
56. As described below, the data returned from these search warrants
revealed that many of these email accounts are linked to each other and used by
membership, and advertisement on the site. Most payments are made through
Bitcoin, and site administrators often send users Bitcoin addresses to which payment
should be made. Payment and blockchain records tied several e-mail addresses to
administrators (per their own posts on WWH Club), Makein is the owner and
control(s) the Makein account on WWH Club and the Makein account on
Skynetzone.
or around May 2019, Makein (on Skynetzone) sent a message advising a Skynetzone
asking the user to send payment for an advertisement to a Bitcoin address ending
provided by Makein on Skynetzone, were clustered with over 100 Bitcoin addresses
("CLUSTER-2"). Between in or around July 10, 2015, and June 22, 2024,
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 22 of 35
[email protected], [email protected],
the association of these five e-mail accounts, I believe that the same person controls
all five accounts. For the reasons described below, each of those five e-mail addresses
is linked to KUBLITSKII, and thus I believe KUBLITSKII controls all five accounts
and therefore at least shares control of the Makein username on WWH Club and
Skynetzone.
62. Thus, there is probable cause to believe that both KUBLITSKII and
KUBLITSKII and KHODYREV control the Makein usemame and act as WWH
63. One of the e-mail accounts tied to WWH administrators and searched
KUBLITSKII.
Punta Cana for KUBLITSKII and his family. Following the date of the excursion,
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 24 of 35
excursmn.
Atomic Fractions using what appeared to be stolen PII and credit card information.
same administrators (per their own posts on WWH Club), Makein is the owner and
All of these domains are associated with businesses that provide services such as web
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 25 of 35
proxies, all of which are services often used by cybercriminals to conduct their
criminal activity, which suggests that the user of [email protected] was also
purchase software that enabled file transfers between iOS and Android phones.
domains are associated with businesses that provide services such as Remote
Desktop Protocol, Voice Over IP, virtual currency exchange, and server hosting, all
of which are services used to maintain websites and process payments, which
suggests that the user of [email protected] was also engaged in the
transactions through which payments were made from Makein's CLUSTER-2, which
services used to maintain websites and process payments, which suggests that the
and Coinremitter.com. All of these domains are associated with businesses that
provide services such as VOIP, reverse proxy protection, and virtual currency
payments, all of which are services used to maintain websites and process payments.
a merchant that allows customers to pay for domain registration with virtual
currency. Multiple domains associated with WWH Club were registered through
transactions through which payments were made from CLUSTER-2. A review of the
Bitpay records revealed the payments were made to CrownCloud, a web hosting
made payments through Bitpay to various web hosting providers to lease the servers
Makein sent a message with a Bitcoin address ending in -FxeWu. The user
subsequently made the required payment and provided the transaction hash as
2021. On or around February 2, 2021, 0.65 bitcoin was sent from CLUSTER-I to an
email address for the associated Binance account was [email protected]. The
registered user of that Binance account was KHODYREV, which indicates that both
between August 29, 2017, and December 24, 2017. The messages, nine of which had
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 29 of 35
documents (such as scanned passports), bank server IPs, bank logon domains and
server IDs, and apparent fraudulent contract documents. In total, the ten referenced
messages contained more than 15 "unauthorized access devices," as that term is used
the account was registered with a fictitious name, a common practice used by
Apple records showed that the registered user for [email protected] was MaKCHM
,ll;aBH�oe (English: Maxim Davidov) with residence address 12467 Aviles Circle,
Palm Beach Gardens, Florida. A review of law enforcement databases revealed there
named MaKCHM ,ll;aBH,l\OB (English: Maxim Davidov). The verified phone number
registered with Apple was 77081989940, however, which is the same phone number
different IP addresses were used to access both the [email protected] account and
KHODYREV's Binance account, often on similar dates and times. (IP commonality
between multiple accounts, particularly when the activity occurs at similar dates and
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 30 of 35
times, often indicates the accounts are used by the same individual or group of
[email protected] account and Makein 's login activity on WWH Club, Skynetzone,
and Center-Club, often on similar dates and times, further illustrating that both
KUBLITSKII and KHODYREV were using the Makein usemame on WWH Club.
Makein posted on WWH Club that Skynetzone was hosting a drawing through which
a user could win a game console. Makein provided a bitcoin address ending in -
or around September 3, 2019, - 2AJTn sent approximately 0.001 bitcoin to pay VOIP
provider, Dellmont, through Bitpay. Records from Bitpay revealed the transaction
an iCloud account. The subscriber name and address registered on that iCloud
account had similarities with information Makein had posted on WWH Club. For
example, Makein stated in messages to WWH Club users that his Telegram handle
registered to Alexandr Maximov. Makein also posted on WWH Club that his
Furthermore, the verified phone number with Apple for the [email protected]
iCloud account was 77081989940, which is the same phone number registered to
accounts above. That comparison revealed, for example, that between January 21
and January 28, 2020, and again between April 10, 2020, and May 28, 2020, the
same IP address was used to login to both ofKHODYREV's Apple iCloud accounts
usemame/identity on both WWH Club. This IP address overlap further supports the
85. The FBl's review of the backend data for WWH Club revealed that a
user with profile name Ange/Batista was one of the primary moderators on the site.
The backend data contained more than 430 of Ange/Batista's posts, which confirmed
that he was assigned moderator privileges on the site. For example, he had authority
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 32 of 35
to lock topic threads for violating the rules, and he also instructed users when
payment was required for certain topics. The registered e-mail address on WWH
messages from the WWH Club sister forum Skynetzone, where Ange/Batista was
accounts often contained stolen PII and credit card information. Some of the emails
88. As described above, Google provided the FBI with records associated
emails that confirmed the user of [email protected] was associated with WWH
forum Center-Club, which was owned by the same administrators as WWH Club.
alias of Ange/Batista.
that contained everything necessary to make purchases with stolen data, such as
credit card numbers, the associated U.S. bank, and PII of the account holder. It also
appeared the same password was created for each stolen credit account: "Krass1."
Furthermore, based on emails from various merchants, it was apparent the stolen
Kazakhstan, arrived together in south Florida. To enter the U.S., they claimed
asylum and provided DHS with the same residence address in Hollywood, Florida.
spends his time visiting the beach and various tourist attractions such as Sea World
evidence that KHODYREV is or has been employed. Yet, in or around March 2023,
96. Thus, while it does not appear either subject has employment in the
U.S., both subjects are using a substantial amount of cash to fund an affluent
lifestyle.
97. From my knowledge and experience, and from the evidence collected in
this investigation, I believe that both KUBLITSKII and KHODYREV are jointly
Case 1:24-mj-03632-JG Document 1 Entered on FLSD Docket 08/06/2024 Page 35 of 35
WWH Club, Skynetzone, and Center-Club. I also believe that through their criminal
CONCLUSION
therefore respectfully request that this Court authorize the requested criminal
complaint charging KUBLITSKII and KHODYREV with those crimes and issue
Respectfully submitted,
Gregory T. Christopher
Special Agent
Federal Bureau of Investigation
Affi�avit su�mitted by email and at�ested to me as true and accurate via �elephon;(,
_
consistent with Federal Rules of Cnmmal Procedure 4.1 and�. this 'l2-
day of July 2024. 11tt;t)
di,._� \Ou- A_ ,u.· � - j