FBI Task Force Arrests Suspected Serial Killer

Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

ST. LOUIS—Special Agent in Charge Richard Quinn has announced the probable cause arrest and pretrial detention of Perez Reed, 25, of St. Louis, Missouri.

An investigation by law enforcement agencies in Missouri and Kansas led to the location and arrest of Reed on Friday, November 5, 2021, as Reed was traveling by train back to St. Louis from Kansas City, Missouri. The FBI’s Safe Streets Violent Crimes Task Force arrested Reed without incident when he got off the train in Independence, Missouri. According to the federal Motion for Pretrial Detention and Hearing, Reed was in possession of a .40 caliber semi-automatic pistol at the time of his arrest. This caliber matches firearm shell casings found at unsolved shootings in the City and County of St. Louis during September 2021. At least six victims were shot, four fatally, with the same .40 caliber firearm.

According to the criminal complaint, Reed lived in St. Louis but had traveled to Kansas City, Kansas, where two victims were shot and killed in a manner consistent with the St. Louis area shootings. He is federally charged with Interstate Transportation of a Firearm with Intent to Commit a Felony.

Over the weekend, the FBI transported Reed back to St. Louis to face federal firearms charges as well as state murder charges in St. Louis County, Missouri. He is scheduled to have an initial appearance today, November 8, 2021, in U.S. District Court in St. Louis. Thank you to the following agencies:

  • St. Louis Metropolitan Police Department
  • St. Louis County Police Department
  • FBI Kansas City Division’s Safe Streets Violent Crimes Task Force
  • Kansas City, Kansas Police Department
  • Independence Police Department
  • Missouri State Highway Patrol
  • ATF
  • U.S. Attorney’s Office, Eastern District of Missouri

The Rocky Mountain Safe Streets Task Force and Multiple Denver Metro Area Police Departments Need Your Help Locating a Suspect Responsible for Multiple Bank Robberies in the Metro Area

Source: Federal Bureau of Investigation FBI Crime News (b)

The FBI Rocky Mountain Safe Streets Task Force and multiple Denver Metro area police departments need your help locating a suspect at large for multiple bank robberies across the Denver Metro area.

The suspect, William Foust, 56, is believed to be responsible for multiple bank robberies across the Denver Metro area since December 2020. He is currently at large for failing to appear in court.

He is described as a Caucasian male, 6’06” with a thin build, dark hair, and multiple tattoos on his arms. Please be on the lookout for Foust or anyone matching the above description.

Bank robbery is punishable up to a 20-year prison sentence for each offense and increases if a dangerous weapon is used in the commission of the crime. The FBI continues to provide financial institutions with the best practices for security to make them less vulnerable to robberies.

If anyone has any information on the location of the individual shown, or any bank robbery, please call the FBI Rocky Mountain Safe Streets Task Force at 303-629-7171; or, you may remain anonymous by calling CRIMESTOPPERS at 720-913-STOP (7867).

FBI Warns the Public About Domestic Adoption Fraud Schemes

Source: Federal Bureau of Investigation FBI Crime News (b)

Whether you are a birth mother or a prospective adoptive family, the adoption process can be filled with uncertainty. FBI Detroit wants to help anyone involved in the adoption process spot potential fraud schemes and to encourage anyone who believes they may be involved in a fraudulent adoption scheme to report it to the FBI. 
 
Adoption fraud refers to any form of intentional misrepresentation or illegal act in the area of adoption. Any participant involved in an adoption—birth parents, prospective adoptive parents, and adoption service providers—are all capable of fraud.  
 
The FBI wants everyone involved in the adoption process to be aware of a few common adoption fraud schemes: 

  • Double matching occurs when a birth mother’s baby is matched to more than one prospective adoptive parent. 
  • Fabricated matching occurs when prospective adoptive parents are matched to a fictitious birth mother, a birth mother who is not pregnant, or a birth mother who is not genuinely interested in placing her baby for adoption. 
  • Fee-related schemes include adoption service providers requiring prospective adoptive parents to pay exorbitant fees upfront or on a recurring basis but failing to provide services promised. 

Fraudulent adoption service providers may: 

  • Misrepresent professional licenses or education
  • Make unsolicited contact to sign up birth mother or prospective adoptive parents
  • Be difficult to reach via phone or email, despite multiple attempts
  • Unnecessarily control communications between adoption participants
  • Quote highly negotiable and inconsistent fees
  • Encourage prospective adoptive parents to pay expenses immediately to avoid losing out on opportunity to adopt
  • Demonstrate a pattern of requesting additional unexpected fees throughout the process
  • Make guarantees about the adoption process, such as:
    • Matching within a specific time frame
    • Birth parents’ willingness to adopt
    • How quickly and easily the adoption will be legally finalized. 

Fraudulent adoption service providers create a sense of urgency to produce fear and to lure birth parents and/or prospective adoptive parents into immediate action. Resist the pressure to act quickly.  

If you believe you have been victimized by an adoption fraud scheme or believe you may be working with a fraudulent adoption service provider, report it to FBI Detroit at 313-965-2323, call 1-800-CALL-FBI, or submit tips online at tips.fbi.gov. A report can also be filed with the Internet Crimes Complaint Center (IC3) at ic3.gov
 
Visit detroit.fbi.gov or fbi.gov/adoptionfraud to get more information about adoption fraud.  
 
If you would like adoption fraud brochures for distribution, please contact SA Mara Schneider at mrschneider@fbi.gov.

Arrest in Ransomware Attack on Kaseya

Source: Federal Bureau of Investigation FBI Crime News (b)

FBI Director Christopher Wray delivered the following remarks during a press conference at the Department of Justice in Washington, D.C., with partner agency officials announcing arrests and charges in connection with the Sodinokibi/REvil ransomware. (Remarks as delivered.)

Good afternoon. Today’s announcement of the arrest of Yaroslav Vasinskyi in Poland, and the charges against and seizure from Yevgeniy Polyanin, shows what’s possible when federal and international law enforcement work together with private sector companies. It also demonstrates our resolve in pursuing criminal enterprises that use ransomware to threaten our critical infrastructure, our public health and safety, and our economic vitality. 

As the attorney general noted, this ransomware strain has wreaked havoc across the globe, extorting vast sums and inflicting significant damage with attacks on, to name just a few: JBS foods, local governments in Texas, hospitals, schools, 911 call centers, and, of course, Kaseya. 

When Kaseya realized that some of their customers’ networks were infected with ransomware, they immediately took action. They worked to make sure both their own customers—managed service providers [MSPs]—and those MSPs’ customers downstream quickly disabled Kaseya’s software on their systems.

They also engaged with us early. The FBI then coordinated with a host of key partners—including CISA and foreign law enforcement and intelligence services—so Kaseya could benefit from all of our expertise and reach as it worked to put out the fire. 

Kaseya’s swift response allowed the FBI and our partners to quickly figure out which of its customers were hit and for us to quickly share with Kaseya and its customers information about what the adversaries were doing, what to look for, and how the companies could best address the danger. 

Here, we were able to obtain a decryption key that allowed us to generate a usable capability to unlock Kaseya customers’ data. We immediately strategized with our interagency partners and reached a carefully considered decision about how to help the most companies possible, both by providing the key and by maximizing our government’s impact on our adversaries, who were continuing to mount new attacks. 

Ultimately, we were able both to unlock encrypted data and to take bad actors out of operation, including by hitting Sodinokibi more broadly, seizing cryptocurrency—and, as you just heard, late last week, our partner Romanian authorities also arrested two other individuals suspected of cyberattacks using Sodinokibi/REvil ransomware. 

As the attorney general and the deputy attorney general mentioned, the steps we’ve announced today are yet another example highlighting why the public needs breach reporting legislation that provides the FBI real-time access to information about ransomware attacks and other criminal breaches. 

When the FBI is engaged early, we can provide victims more and better support. We get them the intelligence and technical information they need faster. And we can quickly work back from the intrusion to follow and seize the criminals’ money before it can jump through wallet after wallet and exchange after exchange, identify other victims about to be hit or in the early stages of further attacks, and make connections between what the reporting victim sees and intelligence that we’re gathering from around the world, arming both the private sector and our government partners with insights they can act on. 

We’ve deployed technically trained agents, computer scientists, intelligence analysts, and others in every one of our 56 field offices across the country so that we can warn businesses big and small, wherever they may be, quickly and with the information they need to defend their networks. 

Over the past few years, ransomware schemes have repeatedly crippled hospital systems, targeted the energy sector, threatened emergency services, and cost or endangered thousands of jobs at businesses of every kind and size. 

Now most of the time, the actors themselves are trying to hide abroad, but as we’ve shown time and time again, we’re still gonna pursue them, disrupt them, and hold them accountable. The long arm of the law reaches a lot further than they think. 

And we’ve got ways of disrupting those sheltering in places like Russia—as Polyanin discovered when he woke up and found $6.1 million he’d extorted from his victims missing. 

Good partners of ours, like the Treasury and State departments, are also adept at turning the results of our investigations into action and pressure abroad. 

I want to thank Kaseya and other private sector partners for their invaluable help in this case—and for the way they’ve joined our response to the ransomware threat. 

I also want to thank our own Dallas and Jackson field offices for leading the investigation. 

And I’m grateful to all our federal partners and our many foreign partners, especially Poland, Romania, Ukraine, France, and Germany. 

The cyber threat is daunting—but when we combine the right people, the right tools, and the right authorities, our adversaries are no match for what we can accomplish together. 

Thank you. And I’ll turn the podium over to the Deputy Secretary of the Treasury Wally Adeyemo. 

FBI Director Christopher Wray’s Remarks at Press Conference Announcing Sodinokibi/REvil Ransomware Arrest

Source: Federal Bureau of Investigation FBI Crime News (b)

FBI Director Christopher Wray delivered the following remarks during a press conference at the Department of Justice in Washington, D.C., with partner agency officials announcing arrests and charges in connection with the Sodinokibi/REvil ransomware. (Remarks as delivered.)

Good afternoon. Today’s announcement of the arrest of Yaroslav Vasinskyi in Poland, and the charges against and seizure from Yevgeniy Polyanin, shows what’s possible when federal and international law enforcement work together with private sector companies. 

It also demonstrates our resolve in pursuing criminal enterprises that use ransomware to threaten our critical infrastructure, our public health and safety, and our economic vitality. 

As the Attorney General noted, this ransomware strain has wreaked havoc across the globe, extorting vast sums and inflicting significant damage with attacks on, to name just a few: JBS foods, local governments in Texas, hospitals, schools, 911 call centers, and of course, Kaseya. 

When Kaseya realized some of their customers’ networks were infected with ransomware, they immediately took action. 
They worked to make sure both their own customers—managed service providers [MSPs]—and those MSPs’ customers downstream quickly disabled Kaseya’s software on their systems 

They also engaged with us early. The FBI coordinated with a host of key partners—including CISA and foreign law enforcement and intelligence services—so Kaseya could benefit from all of our expertise and reach as it worked to put out the fire. 

Kaseya’s swift response allowed the FBI and our partners to quickly figure out which of its customers were hit and for us to quickly share with Kaseya and its customers information about what the adversaries were doing, what to look for, and how the companies could best address the danger. 

Here, we were able to obtain a usable decryption key that allowed us to generate a capability to unlock Kaseya customers’ data. 
We immediately strategized with our interagency partners and reached a carefully considered decision about how to help the most companies possible, both by providing the key, and by maximizing our government’s impact on our adversaries, who continued to mount new attacks. 

Ultimately, we were able both to unlock encrypted data and to take bad actors out of operation, including by hitting Sodinokibi more broadly, seizing cryptocurrency, and, as you just heard, late last week our partner Romanian authorities also arrested two other individuals suspected of cyberattacks using Sodinokibi/REvil ransomware. 

As the attorney general and deputy attorney general mentioned, the steps we’ve announced today are yet another example highlighting why the public needs breach reporting legislation that provides the FBI real-time access to information about ransomware attacks and other criminal breaches. 

When the FBI is engaged early, we can provide victims more and better support. We get them the intelligence and technical information they need faster. And we can quickly work back from that intrusion to follow and seize the criminals’ money before it can jump through wallet after wallet and exchange after exchange, identify other victims about to be hit or in the early stages of further attacks, and make connections between what the reporting victim sees and intelligence we gather from around the world, arming both the private sector and our government partners with insights they can act on. 

We’ve deployed technically trained agents, computer scientists, intelligence analysts, and others in every one of our 56 field offices across the country so we can warn businesses big and small, wherever they may be, quickly and with the information they need to defend their networks. 
Over the past few years, ransomware schemes have repeatedly crippled hospital systems, targeted the energy sector, threatened emergency services, and cost or endangered thousands of jobs at businesses of every kind and size. 

Most of the time, the actors themselves are trying to hide abroad, but as we’ve shown time and again, we’ll still pursue them, disrupt them, and hold them accountable. The long arm of the law reaches a lot farther than they think. 

And we’ve got ways of disrupting those sheltering in places like Russia—as Polyanin discovered when he woke up and found $6.1 million he’d extorted from his victims missing. 

Good partners of ours, like the Treasury and State departments, are also adept at turning the results of our investigations into action and pressure abroad. 

I want to thank Kaseya and other private sector partners for their invaluable help in this case—and for the way they’ve joined our response to the ransomware threat. 

I also want to thank our own Dallas and Jackson field offices for leading the investigation. 

And I’m grateful to all our federal partners, and our many foreign partners, especially Poland, Romania, Ukraine, France, and Germany. 
The cyber threat is daunting—but when we combine the right people, the right tools, and the right authorities, our adversaries are no match for what we can accomplish together. 

Thank you. And now I’ll turn the podium over to the Deputy Secretary of the Treasury Wally Adeyemo.