Age, Biography and Wiki

Roman Seleznev was born on 1984 in Russian. Discover Roman Seleznev's Biography, Age, Height, Physical Stats, Dating/Affairs, Family and career updates. Learn How rich is He in this year and how He spends money? Also learn how He earned most of networth at the age of 39 years old?

Popular As N/A
Occupation N/A
Age 39 years old
Zodiac Sign N/A
Born , 1984
Birthday
Birthplace N/A
Nationality Russia

We recommend you to check the complete list of Famous People born on . He is a member of famous with the age 39 years old group.

Roman Seleznev Height, Weight & Measurements

At 39 years old, Roman Seleznev height not available right now. We will update Roman Seleznev's Height, weight, Body Measurements, Eye Color, Hair Color, Shoe & Dress size soon as possible.

Physical Status
Height Not Available
Weight Not Available
Body Measurements Not Available
Eye Color Not Available
Hair Color Not Available

Dating & Relationship status

He is currently single. He is not dating anyone. We don't have much information about He's past relationship and any previous engaged. According to our Database, He has no children.

Family
Parents Not Available
Wife Not Available
Sibling Not Available
Children Not Available

Roman Seleznev Net Worth

His net worth has been growing significantly in 2022-2023. So, how much is Roman Seleznev worth at the age of 39 years old? Roman Seleznev’s income source is mostly from being a successful . He is from Russia. We have estimated Roman Seleznev's net worth , money, salary, income, and assets.

Net Worth in 2023 $1 Million - $5 Million
Salary in 2023 Under Review
Net Worth in 2022 Pending
Salary in 2022 Under Review
House Not Available
Cars Not Available
Source of Income

Roman Seleznev Social Network

Instagram
Linkedin
Twitter
Facebook
Wikipedia Roman Seleznev Wikipedia
Imdb

Timeline

2018

Seleznev is currently being held at the medium security prison FCI Butner in North Carolina, after being transferred from USP Atlanta in 2018. He requested to be transferred to FCI Butner due to the prison's good living conditions and hospital.

2017

In 2016, after a 1½-week trial in the U.S. District Court for the Western District of Washington, a jury found Seleznev guilty on 38 counts; the following year, he was sentenced to 27 years' imprisonment. On May 19, 2017, Seleznev faced charges in Atlanta and Nevada; he pled guilty that September to conspiracy to commit bank fraud, and was sentenced to 14 years in prison in November. This sentence will run concurrently with his original sentence.

2014

Roman Valerevich Seleznev (or Seleznyov, Russian: Роман Валерьевич Селезнёв , born 1984), also known by his hacker name Track2, is a Russian computer hacker. Seleznev was indicted in the United States in 2011, and was convicted of hacking into servers to steal credit-card data. His activities are estimated to have caused more than $169 million in damages to businesses and financial institutions. Seleznev was arrested on July 5, 2014, and was sentenced to 27 years in prison for wire fraud, intentional damage to a protected computer, and identity theft.

Seleznev's 2014 arrest was controversial in Russia. Russian officials called his arrest a "kidnapping", and said that the U.S. had failed to notify Russian consulates. The DOJ initially refused to disclose the location of Seleznev's arrest, but prosecutors later revealed he was arrested while on vacation at Kanifushi Resort in the Maldives. The Russian Foreign Ministry criticized the island country for failing to follow "international legal norms", which prosecutors said was justified based on the noncooperation of the FSB in 2009 and the scope of Seleznev's crimes. As the Maldives does not have an extradition treaty with the United States, the USSS negotiated directly with the Maldivian government to arrange an expulsion of Seleznev into U.S. law enforcement custody, from which he was sent to Guam to await trial.

2013

DHS Secretary Jeh Johnson said in a statement the arrest showed that "despite the increasingly borderless nature of transitional organized crime, the long arm of justice – and the Department of Homeland Security – will continue to disrupt and dismantle sophisticated criminal organizations".

2012

After shutting down nCuX, Seleznev created two other names (Track2 and Bulba) and used them to operate his own automated stolen-credit-card shops. He bought advertising space in the "Dumps" section of the illegal carding forum carder.su, which was shut down in a 2012 Department of Homeland Security operation. Horohorin's advertising campaign on carder.su was also shut down, and a denial-of-service attack ensued. He was arrested by USSS in August 2010, leaving Seleznev without competition.

2011

During a vacation in Morocco, Seleznev received a severe head injury in the 2011 Marrakesh bombing and was evacuated to Moscow for surgery.

2009

He contacted BadB, another hacker, to gain more experience in exploiting financial systems. BadB, a cybercriminal identified in 2009 as Vladislav Horohorin, provided Seleznev with an automated script to look for credit card traces in systems and networks. With this script, Seleznev obtained his first credit-card dumps, which he resold to Horohorin. He became dissatisfied with Horohorin, and decided to begin his own credit-card-dump operation using the nickname nCuX (from Russian: псих , "psycho").

By May 2009, USSS believed they had collected enough information to come to the conclusion that nCuX was probably the identity of Roman Seleznev. They had a meeting with the Russian intelligence agency FSB in which they shared information from their investigation and their belief that nCuX was Seleznev. Shortly after this meeting, in June 2009, nCuX closed all of his accounts and disappeared from the Internet; USSS suspected FSB had tipped Seleznev off.

2008

Seleznev expanded his operations in 2008 from scanning MSRDP with default (or no) passwords to developing sophisticated malware which could intercept network traffic and search network shares, distributing it through flaws in Internet browsers by injecting malicious code into advertising traffic. He infected many computers, primarily in the United States.

2003

He began his activities in early 2003 on the credit card fraud site CarderPlanet, providing paid Social Security numbers and criminal-history research using (among others) stolen LexisNexis accurint.com accounts. Seleznev's employee later created a scanner which allowed a user to scan the internet for MSRDP open ports (3389 by default). Default configurations provided poor protection at the time, and many administrator accounts were not secured by passwords. Exploiting this vulnerability, Seleznev and his partner accessed many remote computers, including those with financial and credit-card data).