Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Information on the 2024 Campaign is available now.  Click here to find out more.

Volodymyr Iuriyovych Kadariya

$2.5M Reward


  • The Secret Service, in partnership with the U.S. Department of State, is offering a reward of up to $2,500,000 for information leading to the arrest and/or conviction of this individual.

 

 
 KADARIYA 1  KADARIYA 2  KADARIYA 3

ALIASES: Vladimir Yurevich Kadaria,  Володимр Юрійович Кадарія, Владимир Юрьевич Кадария, “Andrii Kovalov,” “Stalin,” “Eseb,” “baxus”
DOB: March 2, 1986
NATIONALITY: Belarus
CITIZENSHIP: Belarus
HEIGHT: 5’8”
WEIGHT: 180 lbs
HAIR COLOR: Black / Grey / Balding
EYE COLOR: Brown
U.S. SECRET SERVICE FIELD OFFICE: Headquarters Cyber Investigative Section

CASE SUMMARY

On August 12, 2024, the U.S. Attorney’s Office for the District of New Jersey unsealed an indictment charging Belarusian national Volodymyr Iuriyovych Kadariya with conspiracy to commit wire fraud, conspiracy to commit computer fraud, and two counts of substantive wire fraud. 

Kadariya is charged with cybercrime offenses associated with a scheme to transmit the Angler Exploit Kit, other malware, and online scams to the computers of millions of unsuspecting victim Internet users through online advertisements — so-called “malvertising” — and other means from October 2013 through March 2022. The malvertising campaigns were designed to appear legitimate, but often redirected victim Internet users who viewed or accessed the advertisements to malicious sites and servers that sought to defraud the users or delivered malware to the users’ devices. The Angler Exploit Kit was a leading vehicle through which malware was delivered onto compromised electronic devices. 

Kadariya and his co-conspirators also allegedly enabled the delivery of “scareware” ads that displayed false messages claiming to have identified a virus or other issue with a victim Internet user’s device. The messages then attempted to deceive the victim into buying or downloading dangerous software, providing remote access to the device, or disclosing personal identifying or financial information. 

Kadariya and his associates used multiple strategies to profit from their widespread hacking and wire fraud scheme, including by using accounts on predominantly Russian cybercrime forums to sell to cybercriminals access to the compromised devices of victim Internet users (so-called “loads” or “bots”), as well as information stolen from victims and recorded in “logs,” such as banking information and login credentials, to enable further efforts to defraud the victim Internet users or deliver additional malware to their devices.

The prosecution is being handled by the U.S. Department of Justice Criminal Division’s Computer Crime and Intellectual Property Section and the U.S. Attorney’s Office in New Jersey. 

Relevant Links

The charges and allegations contained in the indictment are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

If you have information regarding this individual, please contact the U.S. Secret Service at MostWanted@usss.dhs.gov.