Court Fie no. 7
‘SUPERIOR COURT OF JUSTICE
(CENTRAL SOUTH REGION)
IN THE MATTER OF an application pursuant to section 13 of the Extradition Act for a
‘warrant for the provisional arrest of CONNOR RILEY MOUCKA a.k.a. ALEXANDER
ANTONIN MOUCKA a.k.a, JUDISCHE a.k.a, CATIST a.k.a. WAIFU a.k.a. ELLYEL8
AND IN THE MATTER OF an Application fora sealing order prohibiting public access to
this Application
BETWEEN:
‘THE ATTORNEY GENERAL OF CANADA
(ON BEHALF OF THE UNITED STATES OF AMERICA
Applicant
and
CONNOR RILEY MOUCKA a.k.a. ALEXANDER ANTONIN MOUCKA a.k.a.
JUDISCHE a.k.a, CATIST a.k.a, WAIFU a.k.a. ELLYELS
Person Sought
for Extradition
AFFIDAVIT
|, Cot. QD Whitington of the Royal Canadian Mounted Police, MAKE OATH
[AND SAY AS FOLLOWS:
1 | am currently employed withthe National Cybererine Investigative Team vith
the Royal Canadian Mounted Police (ROMP). | am assigned to assist withthe request
{rom the United States of America for he extration of CONNOR RILEY MOUCKA a.k.a.
ALEXANDER ANTONIN MOUCKA aka, JUDISCHE aka. CATIST aka. WAIFU
aka. ELLYELS (‘MOUCKA’) As such, | have knowiedge ofthe matters deposed ton
this affidavit. | beliave the information contained inthis affidavit to be tue.2 | affirm this affidavit in support of an application by the Attorrey General of
‘Canada for a warrant forthe provisional arrest of MOUCKA, pursuant to section 13 of the
Extradition Act (the “Act.
|. The Minister of Justice Canada has authorized the Attorney General of
Canada to apply for a warrant of provisional arrost.
3 ‘Attached as Exhibit" is a copy of the Minister's authorization in this matter,
dated October 25, 2024 It states that
‘The United States of America has requested that Canada seek the provisional
arrest of CONNOR RILEY MOUCKA a.k.a. ALEXANDER ANTONIN MOUCKA.
aka, JUDISCHE a.ka. CATIST a.k.a, WAIFU a.k.a. ELLYELB,
‘The Attomey General of Canada is authorized to apply for a provisional arrest
warrant.
IL It is Necessary in the Public Interest to Arrest MOUCKA, including to
prevent him from escaping or committing an offence
4. Attached as Exhibit *B" is a copy of the Request for Provisional Arrest to
Canada, which includes the Statement of Facts and Urgency (‘Request’) inthis matter,
which | have read.
5. | believe it is necessary in the public interest to issue a warrant for the arrest of
MOUCKA. My boli is based on the following information set out inthe Request
a) Sefiousness ofthe allegations: MOUCKA is wanted for prosecution in the U.S.
for alleged computer intrusioniransom offences. MOUCKA and his co-
‘conspirators, including John Erin Binns, hacked into at least 10 companies’
protected computer networks, stole sensitive information, threatened to leak
the stolen data unless the victims paid a ransom, and published, sold, or offered
to soll this stclen data online."
b) To date, MOJCKA and his co-conspirators have gained unlawful access to
billions of sensitive customer records, including non-content call and text
history records, banking information, ‘medical information, Social Security
* Stent of ace tp9
°)
°)
9
9)
h)
numbers, payroll records, and other personally identifiable information. The co-
conspirators have successfully extorted atleast $2.5 milion from atleast three
Victims and cantinue to attempt to extort victims. Finally, the co-conspirators.
have posted, and continue to post, offers to sell vicims’ stolen data on
cybereriminal forums.*
Risk of fight: VOUGKA poses a serious risk of fight. He has the means to fle.
He has earned at least approximately $2.5 milion in ransom payments for
stolen data from Victim-1 customers already interviewed by the PDI."
Based on lawfully obtained screenshots from MOUCKA's iCloud account,
MOUCKA controls a significant amount of cryptocurrency stored in wallets that
have not yet been found by law enforcement, including an unknown bank
account or crypto wallet showing a balance of $3,496,076.97. These funds
could be used fo facilitate his fight and would support him afterwards,*
Evidence also indicates MOUCKA is aware ofthe gravity ofthis case and the
exposure he wil face upon extradition to the United States. He has repeatedly
ciscussed his operational security measures and attempts to delete evidence
in order to evade identifcation and apprehension. MOUCKA has repeatedly
purchased new laptops and deleted and created new accounts over the course
of his offences >
‘The investigation has also revealed that MOUCKA has considered obtaining
foreign citzenship. For example, in February 2024, he sent a message stating,
"lean gat dua citizenship to Czech Republic prety sure, |want an eu passport.”
‘The U'S. authorities have no information about whether he has actually sought
todo so®
‘Additionally, media outlets have contacted U.S. authorities about this matter
‘and one outet indicated it intends to name MOUCKA in an article to be
‘submitted for publication on October 25, 2024. U.S. authorities believe that this
publication would increase risk of fight and lead MOUCKA to destroy evidence
{and publish stolen information.”
Risk of further criminality: Evidence gathered over the last several months also
establishes fiat MOUCKA continues to be actively engaged in hacking
activiies, MCUCKA's campaign has involved the theft of terabytes of sensitive
data from tens. if not hundreds, of victims. Additionally, MOUCKA has
repeatedly exloried and re-extorted his vicims, resulting in enormous and
2 Semen of Fst at
2 Soement of Fata 916
* Ststetent of Fstop 3 and 1,
“Samet of Pte tp 16.
> Stent of ace a 16‘ongoing harm not only to the corporations Impacted but also the millions of
Individuals whose data was stored by these corporations. ®
|) MOUCKA and nis conspirators continue to sell, publish, and otherwise leak this
dala onlina, and avery day that he is allowed to remain free, his harms will
continue. As recently as October 2024, MOUCKA attomptod to re-oxtor at laast
‘one victim, repeatedly threatening o release more ofthis company's data even
after the company paid @ ransom. MOUCKA has also continued to publish
private data stolen from victims online, and to aggressively market this data for
sale, Stolen data was posted publicly at least as recently as on or about
September 20, 2024.9
1) Risk of danger to the public, to police, and to himself: MOUCKA poses an
‘ongoing danger to the publec, to police, and fo himself. On January 10, 2024,
MOUCKA, using his Nutz Discord Account, sald ‘I think Id make a really good
serial killer" and repeatedly referenced committing mass kilings and obtaining
firearms,
k) MOUCKA also discussed committing suicide and suicide by cop on both
January 11, 2024, and January 18, 2024; on the latter occasion, MOUCKA
Stated, "I think | want to do suicide by cop." In another message, MOUCKA
stated, I need guns to kil Canadians."
I, MOUCKA\ts in Canada
6 | belive that MOUCKA\s in Canada and resides CD, Kitchener,
Ontario, My belies based on the folowing
2) The Request states that MOUCKA's adcress s QIN Kichener,
Ontario,
b) The Request states that MOUCKA's Apple account provides ovidence of his
identity, location and criminal activity. Specifically
i. Apple records produeed in response to legal process showed MOUCKA's
‘account (i) was accessed from IP address 24,246.30.67 [the Canadian
IP Adcrass’] over 500 times between April 1, 2023, and August 20, 2024;
(i) nad a residential address of Kitchener, Ontario,
N2A 1X4, a phone number (250) ‘and a machine ID of
(i) reflected numerous
purchases using the Canadian IP Address between June 22 and July 8,
Senet of act a p17,
* Stent of Face tp 17-18
‘Siren of Fact xp 185
2024, including purchases of an iPhone 15 Pro, MacBook Air, and (Pad
4 all ofwhich were billed to “Alexander Moucka" and shipped
n Kitchener, Ontario, Canada ("Target Location’). and
(jv) reflected paymants on the account by an "Alexander Moucka” using
both PayPal and Mastercard, some of which used the Canadian IP
‘Address;"?
ii U.S. authorities reviewed information stored in the Apple account's
iGioud storage. loud is a file hosing, storage, and sharing sence
provided by Apple. Numerous photos in the Apple account’ iCloud
provide direct end circumstantial evidence of MOUCKA’s involvement in
{he criminal actviy and his locaton. For example, the iCloud account
contains mutiple photes of MOUCKA’s Canadian passport, including one
with full name Connor Riley Moucka, passport numbe QD. dato
ofbih 18 August 1989, in Kitchener, Canada;"*
i MOUCKA’s Apsle ilo account coisins (1) a screenshot ano
feospt fran Pad Prothalshipped "Ateneo
(@@wichoner, ON N2A 1x4; and (2) a Best Buy order receipt from July
Stora Sisters wctees gaming newcet, tobe sipped
“Alexander Mout" 2 MID oner, ON NOAA
6) The Request nudes evidence that MOUCKA's Google acount and Discord
TeScunthave ao Boon accessed atthe same Garodion I Address
|. AWHOIS lookup showed that the Canadian IP Address is provisioned
by TekSavvy Solutions Inc., a Ganadian service provider, and geolocates
to Watertoo, Ontario, Canada.“
J. Google account connormouckasjatlgmailcom has also used the
‘Canadian IP Address as recently as August 26, 2024."°
ii, IP records from Discord showed that the user of the Nutz Discord
‘Account logged into the account from the Canadian IP Address over
3,360 times between October 28, 2023, and April 4, 2024, ©
4) On October 21, 2024, officers of the RCMP attended a
Kitchener, Ontario, to confirm that MOUCKA resides at that location. Shorty
after 2:20pm, a plain clothes officer kntocked on the front door and rang the bel
MOUCKA answered the door and identified himself as “Alex. At one point,
* Stet of Fass at pp 12
"State Fact tp 2
Statement of Pete tp 18.
"Staten of Fate tp 1.
"Statament of Pas tp 1.MOUCKA said “You woke me up Sir’. The plain clothes officer observed that
MOUCKA was disheveled and very obviously freshly-awoken.
@) Attached as Exhibit "C" are photographs of MOUCKA taken by the surveillance
team on Ocober 21, 2024. | have compared these photographs to the
photographs attached to the Request and confirm and itis one and the same
person
7 “The Requcst doseribes the poreon cought with tho following identifiors:
Name (include AIK/As): Connor Riley Moucka a.k.a. Alexander Antonin Moucka
Countries) of Citizenship: Canada
Date(s) of Birth: August 18, 1999
Place of Birth: Kitchener, Ontario, Canada
Race: White
Gender: Male
Hair Coior: Brown
Eye Color: Brown
IV. A Warrant for MOUCKA’s Arrest has been issued
8. Included at Exhibit Bin the Requests a copy ofthe warrant forthe arrest of
MOUCKA issued by the United States District Court for the Westem Distict of
‘washington on October 10, 2024V. Sealing Order
9. tis requested that this cour file be sealed, until MOUGKA is arrested, at which
point the cour fle can be unsealed. The grounds fr the sealing order are as follows: If
MOUCKA wore to become aware of his cout fle and its contents before his artes, the
tisk of ight would increase, as would the rik that he might attempt to delete or destroy
evidence in ofder to evade apprehension and identification, Furthermore, as stated
above, MOUCKA poses a danger othe public, o police, and to himself, and those risks
‘would be elevated if he were to beceme aware of this cout fle and its contents before
police are able to execute his arrest.
‘SWORN REMOTELY pursuant to
O.Reg 431/20 Whitington
stated as being located inthe City of
Ottawa in the Province of Ontario,
before me at the City of Vaughan,
in the Province of Ontario on
(October 28, 2024,
Whittingtor Tate
(00207711
Tynne Amit itingion
‘A-commissioner in and for the
Province of Ontario, Cty of Toronto
{or the Goverment of Canada,
Department of Justice
Expires January 11, 2026‘This is Exhibit’ refered to in the afidavit
‘of Jaclyn Whitington sworn before re this
28th day of October, 2024.
Axmith, Lynne === ~ Form
= Section 2-Auhorty opps fre
A Commissioner for taking Affidavits ‘provisional arrest warrant
‘TO: The Attorney General of Canada
Inthe matter ofan extradition request pursuant to the provision of the Extradition
Act SC 1999, 618
SUPERIOR COURT OF JUSTICE
BETWEEN:
‘THE ATTORNEY GENERAL OF CANADA
(on behalf of the United States of America)
-and-
CONNOR RILEY MOUCKA
AKA ALEXANDER ANTONIN MOUCKA; JUDISCHE;
‘CATIST; WAIFU; AND ELLYEL®.
AUTHORIZATION TO APPLY
(Section 12 Extradition Act)
‘The United States of America has requested that Canada seek the provisional
arrest of Connor Riley Moucka AKA Alexander Antonin Mouckat judische;
‘atist; waif; and ellyel®,
‘The Attorney Gereral of Canada is authorized to apply fora provisional arrest
warrant.
DATED at Gatineau, Quebec, on the 25¢ day of October 2024,
vil (lim
Vieky tif, Counsel,
International Assistance Group
for the Minister of Justice of Canada‘This is Exhibit B* referred to in the affidavit
Cf Jaclyn Whitington sworn before me tis
2a ay of October, 2024.
eourst ron movsona. aad oT ee
Comnssone for aang Aas
RETURN COMPLETED FORM 10:
Office of international Affairs Phone: (202) 514-0000
(Criminal Division Fax: (202)514-0080
US. Department of Justice
‘STATEIDISTRICT REQUESTING PA: US. Attorney's Office forthe Westom District of
‘Washington; Computer Crime & Intellectual Property Section, Criminal Division
IDENTIFICATION OF FUGITIVE:
‘Name (ichule A/K/AS: Conor Riley Mouska, da Alezander Antonin Moucka
Couns) of Citizenship: Canada
Date) of Bh: August 18,1999 Place of Birth: Kitchener, Oni Canada
Proof of Cizenship atached (FUL. citizen):___(e, passport, naturalization or bith cate)
Race: White Gender: male _X__ female —_
eight,_183om___Weight_Uslaown Mair Color. Brown Bye Color: Brown,
ScarlOther Chaacterstics:_N/A.
Photograph Attached._Yes___ Fingerprints Attached; No
Drivers License No: CD ste issued: Onatio
Passport No QED Date & Place Issued: _Jan. 16, 2017, Denver (Canadian passport)
Natl ID Card No:.N/A__ Date & Place Issued: _N/A
Specific AddesExact Location in Canad: ISI hens, Onsio N2AL4.
in custody in Canada, Charges & Anticipated Date of Release: _NUA.
(Canadian law enforeement contact in Canada (NOT US. contact in Canada) with knowledge of
facts, fugtive's location.Namo & Title: Cp David Kennealy
‘Agency: _Roval Canadian Mounted Police
Law enforcement contact n U.S, with knowledge of facts, fugitive's location
a
[Name & Title: Special Agent Hannah Trepte
‘Agency: Federal Bureau of Investigation
(CHARGES AND BASIS FOR REQUEST
‘US, Charging Or Commitment Document (th cops)
Check One. X__ Indictment
Superseding Indictment
Complaint
judgmentconviction order
‘Other (DESCRIBE)
mbes Cia 160 ccs
Date Filed: _Octoper 10,2024
[Name and Location of Cour U.S_Disivie Court forthe Wester Distt of
‘Washington: Seatte, Washington
Has the Charging Document been unsealed (or, been unsealed for the limited
purpose of sharing the U.S. State Department and a foreign government for
purposes 0° extradition)?
YES_X_ NO
Offenses for which extradition is requested are punishable by atleast one year in prison:
YES_X NO
Statute of Limitasions (attach py)
‘Does statue of linitations preclude prosecution or incarceration?
YES NO _X!rest Warrant (attach copy)
Fugitive is wanted o (check one): X___ Stand Trial
Be Senfenced
Serve a Sentence
Serve Remaining Sentence (indicate how much
eto serve)
Number: _CR24-180-1 LK.
Date Filed:” _Oxiober 10,2024
Issued By: U.S, District Court for he Wester Disc af Washington
‘Name and Location of Court: U.S, District Court forthe Wester District af Washington
Seattle, Washington
C.__ REQUESTING AUTHORITY, AUTHORIZATION, AND FINANCIAL,
COMMITMENTS.
1, Requesting Authority
Federal District _U.S. Atlomey's Office forthe Western Distt of Washinaton
2, Prosecutor Authorization
Provide the name ofthe proseeutor authorizing this PA request
Name: _George 3rown
Title: "Trial Atomey, Computer Crime & Intellectual Property Sector
BY SUBMITTING TILS FORM, THE PROSECUTOR COMMITS TO:
(1) PREPARING A FORMAL EXTRADITION REQUEST WITHIN THE TIME
SPECIFIED BY OTA UPON THE, ARREST OF THE FUGITIVE IN CANADA; AND
(2) ACCEPTING RESPONSIBILITY FOR EXTRADITION-RELATED COSTS.Statement of Facts
if Connor Riley Moucka
Statement of Facts
‘The information set forth in this request has been gathered by U.S. authorities from
approximately April 2024 through the present and includes information from (a) USS. and foreign
vietim companies, including information from interviews and victim computer systems; (6) US.
and foreign service provides, including information lawfully obtained via search warrants, court
orders, and other legal demands; and (e) open-source information and information provided by
private sector incident response companies and other persons.
US. authorities ae investigating MOUCKA, who also uses various online monikers,
but not Limited to, judische, cats, waifu, and ellyel8. MOUCKA also claimed fo an
isname to Alexander, but his “birth name” “is
actually Connor.” Discord s an online communications and messaging company.
MOUCKA and his co-conspirators, including John Brin Binns, hacked into atleast 10
companies’ protected computer networks, stole sensitive information, threatened to lak the stolen
data unless the vietims paid a ransom, and published, sold, or offered to sell this stolen data online.
Many of the victins in this investigation were storing data with a US. software-as-a-
service company (Vietim-1). Vietin-1 provides cloud computing “instances” to its customers,
which provide cloud date analysis capebiltes. These cloud computing instances store data of
Vietin-I's customers, and Vietim-1 generally collects some IP logging information on behalf of
its customers. Vietim-2 dough Victim-S are customers of Vietim-1
MOUCKA and his co-conspirators targetod companies with a common utility dubbed
“rapefiake” by the ackers and “Frostbite” by security researchers). This uty isa software tool
thatthe co-conspirators used to perform reconnaissance on Victim instances. Private sector
security researchers have determined that “rapeflake” could be used fo query information from,
databases, To date, MOUCKA and his co-conspirators have gained unlawful acess to billions of
sensitive customer records, incuding non-content call and text history records, banking
‘information, medical information, Socal Security numbers, payroll records, and other personally
identifiable information, The co-conspirators have suecessflly extorted at least $2.5 millon from
at lest three vietims and continue to attempt to extort vitims, Finally, the co-conspirators have
‘posted, and continue o post, offers wo sll vit sole das gu eyes or
Infiltration and Stealing of Data from Victim companies
Vietim-1 customers targeted by MOUCKA and his co-conspratorshave provided evidence
ofthe following hacking and extortion activities.Victim 2
Vietim-2 is a majo: US. tlecommunications company and wireless network operator. As
Aiscussed below, US. authorities determined that MOUCKA and at last one co-conspirator, John
Erin Binns, successfully hacked into Vietim-2's computer systems and stole approximately SO
billion cll and text record (but not the content of the calls or texts) belonging to Victim-2 and its
customers, which MOUCKA and his co-conspirators monetized by extorting Vietim-2
‘On April 19,2024 the FBI received information suggesting that threat actor had obtained
‘unauthorized access to Vistim-2's computer networks. The FBI lawfully obtained screenshots of
‘Telegram chat messages with a user serving as an intermediary, Individual, as well as another
user labeled "I (indey),” ster discovered tobe John Erin Binns. Binns confirmed to Individual-1
that he had call rcords wth “14 billion entries” from Vietim-2 and requested the phone number
of an FBI agent who had previously investigated Binns for another breach into a different USS.
telecommunicatons prover, for which Binns was previously charged inthe Western District of
Washington,
‘The FBI approached Victim-2, which confirmed that it had been breached and that the
sample data Individual-1 csv inthe Telegram chats was real Vitim-2 customer data. The FBI
also lawfully obtained copies of Telegram communications between Individual-1 and the
Telegram usemame @jud sche (labeled with the display name “catist") which contained a sample
‘of Vietim-2's data, Viet 2 confirmed the data i authentic:
TT Judische Telegram account was later determined to be MOUCKAA, as described below.
Vietim-2 used an outside incident response firm to conduct an investigation and determined
that a machine-to-machine credential had been compromised and used to access Victim-2’s cloud
instance without authorization, Furthermore, the fim determined that particular IP addresses were
‘sed by the threat actors access Vietim-2's cloud instance and exfiltate hundreds of gigabytes
2‘of Vietm-2's information. These included a specific IP addess ("malicious IP address”) from
‘which the malicious actor connected to Victim-2's cloud instance on approximately April M4 and
15, 2024, Information from Vietim-2 indicated that the malicious IP address was hosted by a U.K.
provider. The U.S. author tes also sent legal process tothe U.K. provider. As discussed below,
Binns logged into one of his communications accounts from the malicious IP addres around the
same time thatthe data exiltraion occurred,
“The FRI obtained Ings of sesions, authentication, and jabs from Vietim-1. Combined with
logs from Vietim-2 shown the amount of data exfiltated from its cloud instance, these logs
provided details about theintrusions that occured between at least April 14 through atleast April
28, 2024, during which time malicious IP addresses that were not part of Vietim-2's normal
activities conducted unaudhorized activites on its system. Vietim-2’s logs further show that
Ihundreds of gigabytes of cata were exiltated.
‘Vietin-1 also has recess to its customer’s logs. These logs provide IP adresses used by
‘the threat actrs. The FBI combined information from the logs of Vietim-1 and Vietim-2 to confirm
that Vietim-2's data was sucessfully exfiltrated on April 14, 2024, April 15,2024, and April 24,
2024, and to confirm the IP addresses used in the intrusions.
‘The lawfully obtcined Telegram chats between MOUCKA, Binns, and Individusl-1
contain detailed, inculpatery information about the activity of MOUCKA and Binns and confiem
that MOUCKA was actively inside of Vietim-2's systems. For example, on April 23, 2024, a
person using the @juische moniker, later determined to be MOUCKA as explained below, told
Individval-1, “I can searct yeah, or he [Binns] can. He understands the structure of the data better
than I do, [just provided cccess to him.” The FBI determined that “he” refered to Binns because
cof the information above that Binns had already exfiltrated some Victim-2 information
approximately a week before these messages, Binns also messaged Individual-1 on Apeil 22,2024,
stating, “My partner i trying to got more data"—referring to MOUCKA. MOUCKA, while using
the @judische Telegram weraame, had the following conversation with Individual-I on April 23,
2024:
MOUCKA: ..Did he el you how many tines he has?
Individvl-1: 4tilion or something like that
MOUCKA: —thismany forthe curent month 24356004473 /34 Billion
Individval-t; Wait what? You have access to lve data?
MOUCKA: yes
Individual-1: ‘Or you can just se it
MOUCKA: live
Individual: And you ean download it)??
MOQUCKA: —Yes/ean download or query
Individual; Whoa
MOUCKA: Ieanalso delete and addThe same day, MOUCKA also talked about the dat that “he as exiltrated and indexed at
148,” suggesting Binns Ind already downloaded 14 billion records. The next day, MOUCKA
discussed his ongoing exfltration of approximately 4 billion records:
MOUCKA: “He [Binns] has 14B September and Ill have 35B October”
Individval-1; “ok well get what you can. it just adds more value”
-MOUCKA: “okay good. I'l vet as much as I ean"
MOUCKA: “Can ty o get 34B sept and 358 Oct”
‘On April 24, 2024, MOUICKA, Binns, and Individual-t started a Telogram group chat to
discuss selling Vieim-2's information, As noted above, Victim-2 provided the US. authorities
with information confirming a large amount of data was exflrated on April 14, April 15, and
April 24,
Victim-2 also communicated and negotiated with Individual-1 about a ransom demand in
May, 2024, Ic ultimately guid a ransom to have the stolen data deleted from the server on which
the co-conspirators were staring it Vietim-2 confirmed that thas been re-extorted inthe lst few
weeks. Specifically, Individual-1 contacted them again, on behalf of “eatist” (MOUCKA), and
engaged in ransom negotiations.
Vietio 3
‘Vietm-3 isa majo retailer located inthe United States, On or shout May 23, 2024, a well
‘known compute seeunity and incident response company notified Vietim-3 that it was a potential
victim ofa similar compu intrusion, On May 29, 2024, representatives from Victim-3 met with
the FBI and confirmed that three categories ofits information had been stolen from its cloud
instance, including customer information for approximately 20 million customers, git card
information, and intemal ompany business documents. Vitim-3 also stated that it was actively
negotiating through the same intermediary, Individual, that negotiated with Vietim.2.
‘The FBI also reviewed logs provided by Vietm-1, which indicated that Vitim-3’s instance
was accessed without authorization from approximately April 14, 2024, through May 24, 2024
and tht the rapeflake utility was deployed on Vietim-3's computer systems. (As discussed below,
MOUCKA claimed to hve written the rapeftake utility.) Vietim-3 hired an incident response
company to investigate the breach and confirmed its instance had been compromised using stolen
Jogin credentials belonging toa former contactor located outside the United States. According to
the incident response fim's investigation, this former contractor's credential was. likely
compromised via a credential stesler in approximately 2021 and available in cybercriminal
‘marketplaces as early as May 2021. Stolen redentils are generally available for free and for
purchase on the dark web,
US. authorities obsined and reviewed written records provided by Vietim-3, including
cxails with Individual-1, On May 24,2024, two members of Victm-3”s information security team
‘were contacted via Linkedin by Individial-1, who used his true name. Indvidual-1 offered to
broker a deal withthe hacker and provided a sample ofthe data, Individval-t later requested a
4phone call with Vietim-3 and spoke to Vietim-3's counsel, On May 29, 2024, Individual-1
Indicated that he thought ‘hey “c{ould] close around ($]27ST,000].” Then, on or about May 30,
2024, Individual-1 emailed Viet thatthe threat actor wanted $450,000,
Individeall subsequently informed Vietim-3 that another victim had paid a substantial
som. After several email exchanges and at least one telephone call with Individual, Vietim-3
ceased communications
Im or about June 2724, co-conspirator creaed a post on BreachForums and sated they
‘were making the Victim-} database available for download after Vietim-3's refusal to pay &
‘ransom. The FBI discovered this post, which included a link for download. The FBI accessed this,
link end dovenloaded approximately 10.6 GB of compressed materials. When unpacked, the data
‘was approximately 86,1 G3 and contained numerous fils with filenames that matched queries run
by the treat actors in Victin-1's logs for Vietim-3”s instance. The FBI downloaded the data from
BreachForums and verified that it was consistent with the information from Vietim3's
investigation. Specifically, the downlosded data included customer names, emails, billing
addresses, personal identifying information, purchase information, and fll giftcard numbers with
expiration dates,
‘The FBI sent the first 30 lines ofthe tables of the downloaded data to Vietim-3, which
confirmed that it was a te and accurate representation ofits data, with minor modifications (ihe
timestamps were off in some instances and there were some duplicted rows).
{As part of ongoing extortion efforts involving Vietim-3 deta, a co-conspirator posted on
BreachForums another sample of Vietim-3"s data for sae in or about July 2024
‘The post demanded a ransom payment, which Victim-3 never paid
Victim 4
‘Vietim-4 is « major U.S, entertainment and marketing company. The FBI obtained logs
about Vietim-4's cloud computing instance from Vietim-1, According to those logs, the threat
actor breached Vietim-4’s cloud instance from atleast on or about April 14,2024, through at least
May 18, 2024, Victim informed FBI that the types of data stolen included names, contact
information, partial payment card numbers, and in some instances driver's license numbers and/or
passport numbers. Additicnally, Vietim-4 confirmed that only one account on is Vietim-I cloud
‘computing instance had been breached,
(On or about May 17, 2024, Vietim-4 leamed about a potential breach, whieh it later
confirmed. On May 29, 2024, the FBI interviewed Vietim-4 and discovered it was investigating a
breach of its Vietim-1 cloud computing instance in which threat actors may have stolen
information related to its cstomers" contact information and payment card information. Vitim-4
viewed logs ftom its cloud instance and learned the actors accessed ther instance without
authorization.
nor about May 2(24, a co-conspirator postod on the cybercriminal forum Exploit ina sale
‘of Victims data that puportedly included millions of users and payment card details. The post
5‘included sample data without any names but with sale order IDs, account numbers, account ereated
ata, and partial addresses. The FBI subsequently visited this postin or around June 2024 and
September 2024
“The FBI learned thatthe information offered for sle was not the same as the data stolen
from Victim-4, but Vitin-4 stated that it appeared to have some overlap with what was stolen
from their Vietm-1 instance, suggesting thatthe threat actors were potentially mixing data
Daring this same tin poring, Individal-1 contacted Visti saver ines fering tact
as anntermediny between Vcim-4 andthe threat actors andor advising about MOUCKAs wae
Of the data For example, on lune 20,2024, Indvidalt reached ott two diferent people
fssocnted with Vitim4 i ena none communication, Invi tated, [be hacker has
recently leaked 1 millon ose records and is wetening teak more, They have also éronped
tht price point fo about 100k USD. Atta pre, Liman hey wil slat east 3-tx™
nor about July 2024, Individual indicated tat he had been “extremely successful inthe
past in getting his demands down to a more reasonable amount” Individual-I attached a
BreachForums post, which included an extortion attempt
[As part of continued extortion attempts, a co-conspirator made a subsequent post on a
‘cyboreriminal forum in an attempt to extort Viet,
Im easly October 2024, MOUCKA posted a poll on Telegram using another account
believed to be controlled by him with display name “scarlet the meow eat” and username
@nyakira. Inthe poll he asked people to vote on whether he should leak more of Vietim-4’s data;
the post was lawflly reviewed by U.S. authorities. Vietim-4 never paid a ransom.
Vietim 5
Victim: is a large foreign corporation headquartered in Europe. On or about May 9, 2024,
the FBI notified Victim-S about a potential breach of ts computer systems,
In the Telogram chats provided to the FBI by Individual-1, “ellye18", who was later
identified as MOUCKA shown below, discussed having ongoing access to Vitim-S as of April
25, 2024, MOUCKA stated:
Individual-1: wait. you have access to [Vietim-S]??
MOUCKA: Yes [Victims] ol
Individual-l: that might be too big for now. we might want to start smaller
Individual-1 and MOUCKA also discussed the nature ofthe data MOUCKA had access to,
‘and MOUCKA stated that he focused on “HR” data fist, MOUCKA later stated, “yeah for
[Victim] let me figure out the best way to query that many mssql without the data masks but
without altering the schema to remove the mask be they might notice.”‘The FBI provided Victim-5 with a screenshot of sample HR data from the Telegram chats
and initial indicators of compromise. Vietim-S conducted an internal investigation and
‘subsequently validted thedata fom th sereensho, confirmed tat its Vitim-1 instance had been
‘breached, verified that the inital breach occured on or about April 17, 2024, and indicated that
‘the breach continued throuzh at least May 10,2024, According to Vitim-s internal investigation
anda review oftheir logs, his breach was the result of compromised credentials of two employees
“The stolen data included mames, addresses, company identifieation numbers, and payroll accounts
{or employees across multiple countries, eluding inthe United States
‘Vietm-S subsequently informed the FBI that three types of data had been exfiltrated, First,
Vietim-5's employee data, including those of employees based in the United States, had been
stolen, which included employees’ names, social security numbers, and addresses, es well as
‘company payroll records
Vietim-5 provided he extortion emails that it received tothe FBI. These included an email
fom the same intermediary, Individual-l, On May 13, 2024, Inividual-I notified Vietim-S that
the “threat actor” was “actively downloading” Vietm-S's data, and provided some sample data
and a link t another account with additional data. Victim downloaded sample data from
Individval-t and verified that it contained Vietim-5°s data
‘The FBI also compared IP records from Vietim-s's logs with the login records for @
Diseord account controlled by Binns (the Irdev Discord Account). The FBI’s comparison showed
that common IP addresses were used to log into both Vietim-ss network and Binns’s Irdev
Discord Account, within short timeframes and via one of the same providers, as follows
WaAddress | Irdev Discord (UTC) | Vietim-S (UTC) Isp
194.330.148.136 ‘IRR 10AB | —AAWAOA TIO | Sunrise (Switzerland)
194,230,144 136 “TIRIRORE TEST | —a7TR/RODA TTS | Sunrise Switzerland)
Adilitional Vietins
Based on widespreed reporting, as wel as published analyses by security research firms,
US. authorities are aware of over 100 other companies that may have been victim to similar
computer intrusions conducted by some of the same co-conspirators and using. a similar
sethodology. The FBI has communicated with several U.S. and foreign companies who believe
they were vitims of sinlar computer intrusions by the same actors and confirmed at least 10
companies’ cloud instances that were accessed without authorization, Victims generally are
Vietim-1 customers, mary of whom were targoted using “rapeflake.” Many victims received
samples oftheir stolen dai and were extorted in similar ways.
‘Three Key Discord Acevunts Are Controlled by MOUCKA and Linked to the Intrusions
USS. authorities reviewed IP logs from the intrusions into vitim companies and identified
cious IP adresses a specific times. US. authorities then obtained court orders requiring
7lectronic communication service providers to identify accounts tht had been accessed by the
malicious 1 addresses at specific dates and timestamps. Discord identified accounts accessed fom
the malicious IP addresses during the sme time periods ofthe intrusions, and the goverament then
obtained search wareantson various accounts, as U.S, authorities learned thatthe treat actor
would delete and create aumerous accounts, U.S. authorities determined that three identified
accounts were controlled by MOUCKA and provided key evidence of his identity: (i) User ID
'547214862313435626, wih unique username azurape (the Azutape Discord Account) i) User
TD 1166162525477679110, with prior unique usemane a2zzrrrzzeezzrzrremute (the Nate
Discord Account); and (ii) User ID 750491727025930364, with unique username
‘wetworkmakeitain (the Wetwork Discord Account).
“Most importantly, he Azurape Discord Account directly links MOUCKAA to the @judische
‘Telegram account that sed the rapeflake too to steal information from companies, as discussed
shove, For example, approximately 10 days after a security firm published a report about this
hacking campaign, the Amirape Discord Account claimed ownership ofthe @judische Telegram
‘ceount and subsequently sent link to another Discord user to a public report from & computer
security company about the Vietim-I hack, stating “you can extrapolate to whom this articles
about si}
In addition to thie May 2024 example, Azurape identified @judische as his Telegram
‘moniker in February 2024and April 2024 to other users in Discord chat messages.
Around late May 2024, the Azurape Discord Account stated that “al ican dois hack” and
that “i had [a co-conspirator] post [Vietim-4] sample sales threat and they instantly started to
napotint.” Shortly theoate, in mnid-lune 2024, MOUCKA used the Azurape Pera Aremnt to
ask a third party for “help deerypfing [Vietim-A]crediteards” in exchange for “2m.” About two
days later, the Azurape Discord Account said, “hopefully they do not find the code for rapefiake”™
Decause “is clear i wrote it”
Between December 2023 and February 2024, the Azurape Discord Account repeatedly
‘communicated with Bimns's Irdev Discord Account. In the Azorape Discord Account,
MOUCKA'’s second onlitegirlfiend called him “Connos” several times. He also pointed to his
‘Telegram username, which cannot be easily changed, at least as early as February 2024:
8ran 22
vette
rere aftr ont whenuran ane aceon cong
ajar] as
fawn as
“The Wetworks Discord Acconnt links the Amape and Nutz. Discord Accounts,
Specifically, the Wetwork Discord Accounts user identifies the Azurape Discord Account as his
‘main account. In response to a court order, Discord researched the Azurape Discord Account and
the Wetworks Discord Account and linked them by cookie information, meaning thatthe same
user account onthe same computer accessed both accounts. The Wetwork Discord Account and
the Nutz Discord Accountalso have significant IP overlap, including at leas eight instances where
both accounts were logged into fiom the same IP address within 10 minutes of each other.
Moreover, non-content header information from Discord showed that the Wetwork Discord
‘Account had communicatad withthe Irdey Discord Account, controlled by Binns, inthe months
preceding the computer intrusions under investigation.
Discord records also showed numerous connections between the Nutz Discord Account
and the Azurape Discord Account, suggesting these accounts were under common control by
MOUCKA, including
(common IP address was used to access both the Nutz Discord Account and the
‘Azurape Discord Account on April 19, 2024, during the timeframe ofthe intrusion
to Vietim-2;
(ii) the Nutz Diseord Account sent over 183 messages to, or that included, the Azarape
Discord Account in ealy January 2024;
ii) common IP addresses were used in November 2023 to access the Nutz Diseord
‘Account ad a fie-hosting account that was later used to host Vietim-2's stolen
ata (in or around April 2024); and
(jv) _Mallvad,sprivacy-oriented virtual private network (VPN) provider that does not
callect or maintain personal identifying information about its users and could be
‘used to hide the identity and locaton of the person accessing this account, was used
to access the Azurape Discord Account, the Nutz Diseord Account, and other
accounts 0 interes nthe investigation, inluding the file-hosting account
‘The Azurape Discord Account also claimed to control the moniker “ellel8.” which isa
moniker that has been linked to @judische by the Telegram chats:‘7is/aota)— AROGAT|szurapeHO out he Fol agents that ER my dacord accountant
[EDR my telegram account
6/19/20] 22.0727 azurapeHO byes
6/49/2028) 22:105ifazurapeno wile then delete hs message na few brs when
aes
spa one
6/19/2024| va fuck
ors Ener ng see ort ot
ena sn I cea
=
“The redaction in te above screenshot also shows that Azurape requested help decrypting
credit cards obtained from Vietin-4, whose name is redacted,
‘The FBI conducted analysis of IP adress information obtained through legal process
concerning the Azurape, Wetwork, and Nutz Discord Accounts. While many accounts used
‘Mallvad VPN, the FBI identified various IP address overlaps connecting these accounts to other
indicators associated with the computer intrusions. For example, the stolen Vietim-2 data was
uplosded to a filesharing service with an account registered using the email address
ibizacarbombings{atprotenmailcom, The FBI analyzed IP logs from the
ibizacarbombings{atrotenmail com file-sharing account (the Ibiza File-Sharing Account) and
the Nutz Discord Account and discovered that oth were accessed from the same IP address within
four minutes or less on two occasions, months before the intrusions occurred:
‘Account TP Address Date Time
Nutz Discord Account 198.44.140.172 | aa v2023_| 15:32:00
‘Nutz Discord Azcount| 199.44.140.172 [1212023 | 1537.00
Tiza File- Sharing Account 198.44.140.172 | 12/34/2023 | s:41:04
‘Nutz Diseord Azeount 198.44,140.172 | 12812023 | 15:44:00
‘Nutz Discord Account| 198.44.140.172_| 12812023 | 154600
Ibiza File-Sharing Account y9s.a4.140.172 | 12/91/2023 _| 15:50:07
‘Nutz Discard Account| tos.aa.140.172 | 12/31/2023 | 16:02:00
‘According to information obtained from Discord, in June 2024, MOUCKA, using the
‘Aaurape Discord Account, sent a message to another user with his monero address, apparently
because the recipient had “leftover” monero, (Monet i an anonymity-enhanced eryptocurrency.)
‘The monero address MOUCKA supplied is directly traceable tothe ransom payment made by
‘Vietim-2; specifically, atleast some ofthe bitcoin ransom paid by Vietim-2 was converted into
‘monero and sat tothe same address MOUCKA provided in the Discord chat.Linking the Intrusions te MOUCKA and Binns
USS. authorities cbiained screenshots of Telegram chat messages among three key
‘individuals: (1) @judische, who labeled this account with other display names, including “ellyel8”
and “cats,” who has boor identified as MOUCKA; (2 “Irdey,” identified as co-conspirator John
Erin Binns, a dual U.S. and Turkish citizen residing in Turkey, and (3) Individual, who has
negotiated with vitim companies
“The Telegram chats obtained lawfully by the PDK include information that was not knows
tthe public and was likely only known by those involved inthe intrusions. For example, Binns
and MOUCKA, using Tslogram username @judische, labeled here with moniker “ellyel8,”
discussed breaching Vietin-2's systems and obtaining ens of billions of customer records in chats
dated April 24, 2024, before any public announcement ofthe intrusion into Vietim-2.
24 Apt 2024
etyets 641
| potently found another 258 for October 2022
Going tocheckieit includes previous months or that's ust 06.42
October
tyes 12.08
Can the current buyer afford to keep buying these after the 148 1
keep exiting? Because 'm 20% done onthe 258. 30 you shoul el
him to jst get 1M ready jst in eae hese are monthly 30 we dont
have te wat mute days again, there's 358 per month
‘need you to send 300k for ied to send the 1480 keep 12:17,
texfteatng though Beene this xine consuming andthe dati
‘Additionally, MOUCKA and Binns posted screenshots and samples of data belonging to
Vietin-2 and Vietim-S ithe Telogram chats on April 29, 2024. Both Vietim-2 and Vietim-S
confirmed the samples were actual daa stolen fom their respective systems. MOUCKA discussed
having breached other victims’ computer systems, which the FBI subsequently confirmed had been
breached: vetims had not yet disclosed their breaches at the time ofthe Telegram messages.
MOUCKA’s Apple Account Provides Evidence of His Identity, Location, and Criminal
Activity
US. authorities discovered an Apple account with email address
nanddddwowdffgeaa[atficloud com, which Apple identified in response toa court order based
‘on shared login IP addresses with MOUCKA’s Nutz Discord Account, Apple produced records in
response to legal process showing thatthe account () was accessed from IP address 24.246.30.67
u(the Canadian IP Addkess) over 500 times between April 1, 2023, and August 20,2024; (i) had a
residential address Kitchener, Oniario, N2A 1X4, a phone number (280
2845735), and a machine ID of 2101216876af0172203830fecef532851517eo6; (i) reflected
‘umerous purchases using the Canadian IP Address between June 22 and July 8, 2024, including
purchases of an iPhone 15 Pro, MacBook Ait, and iPad Pro 1, all of which were billed to
“Alexander Moucka” and shipped EID n Kichoncs, Ontario, Canada ("Target
Location”); and (iv) reflected payments on the account by an “Alexander Moucka” using both
PayPal and Mastercard, some of which used the Canadian IP Address. While the fist name on the
account details is “Dai” andthe lastname is “Dd,” Apple provided ‘Tunes Music Store
information that indicates “Alexander Moucka" made Tunes purchases using his Apple account
in October 2023 from the Canadian IP Address, and stated his address was the Target Location.
According to the information fom Apple, the Apple ID nnnnddédwwwalfgsa[at]icloud.com was
‘rented on February 25, 2020,
Additionally, U.S. authorities reviewed information stored in the Apple account's iCloud
storage, iCloud is file hosting, storage, and sharing sorvico provided by Apple. Numerous photos
in the Apple account's iCloud provide direct and circumstantial evidence of MOUCKA’S
involvement in the criminal activity and his leaton
For example, the iCloud account contains multiple photos of MOUCKA’s Canadian
passport, including this one with full name Connor Riley Moucke, passpoct numt