Two Pak Hackers on FBI’s ‘Most Wanted’ List


Mamosa Report

WASHINGTON – FBI has added names of two Pakistani cyber criminals to its “Cyber’s Most Wanted” list.

The two cyber crime fugitives were residing in Saudi Arabia during the period 2008 to 2012 and operated LinkedTel, a business purporting to provide premium telephone services.

The FBI is seeking information from the public regarding the two cyber criminals of their whereabouts. Rewards ranging from $50,000 to $100,000 are being offered for information that leads to their arrest.

The two hackers on the run are Farhan Arshad and Noor Azizuddin. They are wanted for their suspected roles in a global telecommunications hacking operation intended to defraud individuals, telecom companies, and government agencies within the United States and overseas.

Accused Noor Aziz, a/k/a “Noor Azizuddin,” was a Pakistani national who resided in Saudi Arabia and operated LinkedTel, a business purporting to provide premium telephone services. Co-accused Farhan Arshad was a citizen of Pakistan and served as Aziz’s business manager.

Arshad and Azizuddin’s cyber crime spree resulted in losses to victims that amount to upwards of $50 million, the FBI claims.

US law enforcement officials allege that during the course of about four-years, between 2008 and 2012, Arshad and Azizuddin bypassed Internet security measures and gained unauthorized access to business telephone systems.

The two accused hackers then used those telecom systems to initiate long-distance telephone calls to premium rate numbers through a scheme known as international revenue share fraud. The conspiracy caused the owners of the compromised telephone systems to be billed for services they neither ordered nor desired.

According to cyber crime experts, Arshad and Azizuddin are part of an international criminal ring that is suspected of extending into Pakistan, the Philippines, Saudi Arabia, Switzerland, Spain, Singapore, Italy, Malaysia, and other locations.

Arshad and Azizuddin had been indicted for unauthorized access to a protected computer; conspiracy to gain unauthorized access to a protected computer; wire fraud; conspiracy to commit wire fraud; and identity theft.


Previous articleUS Must Probe Killing of 18 Afghans: HRW
Next articleMan Kills Father to Claim Riot Compensation


Please enter your comment!
Please enter your name here