Two members of the cybercriminal organization “ViLE” received federal prison sentences this week for breaching law enforcement databases and using stolen personal information to extort victims.
Sagar Steven Singh, known online as “Weep,” was sentenced to 27 months in prison, while Nicholas Ceraolo, who went by “Convict,” “Anon,” and “Ominous,” received 25 months for conspiracy to commit computer intrusion and aggravated identity theft.
United States District Judge Frederic Block handed down the sentences in federal court in Brooklyn, with Singh receiving his sentence earlier today and Ceraolo on May 30, 2025.
The defendants illegally accessed a nonpublic, password-protected web portal maintained by a U.S. federal law enforcement agency designed for sharing intelligence with state and local law enforcement agencies.
Using a stolen law enforcement officer’s password, Singh and Ceraolo gained unauthorized access to sensitive records including narcotics and currency seizures, as well as classified intelligence reports.
The portal provided them with what Singh himself described as “fucking potent tools” that gave access to government databases and five different search tools for obtaining personal information about U.S. citizens.
United States Attorney Joseph Nocella Jr. emphasized the severity of their actions, stating that the defendants “breached a federal law enforcement database, used multiple means to steal sensitive personal information, and exploited that data to extort and threaten innocent people and their families.”
ViLE Hacker Group
The ViLE organization, which used a disturbing logo depicting “the body of a hanging girl,” operated a sophisticated extortion scheme targeting innocent victims.
Members systematically collected personal information including social security numbers, driver’s license numbers, and home addresses.
They then threatened to “dox” victims by posting this sensitive information on a public website controlled by the group.
The criminal enterprise followed a pay-to-remove model, where victims could pay money to have their personal information removed from or prevented from being posted on the website.
Singh demonstrated the group’s callous approach when he threatened one victim, writing that he would “harm” the victim’s family unless they provided Instagram account credentials.
He reinforced his threats by displaying the victim’s social security number, driver’s license information, and home address, telling them “nobody is safe” and “you’re gonna comply to me if you don’t want anything negative to happen to your parents.”
Law Enforcement Response
According to Report, Even as they continued their criminal activities, both defendants recognized the illegal nature of their actions.
Internal communications revealed their awareness of potential consequences, with Ceraolo writing to Singh that “were all gonna get raided one of these days.”
Singh admitted to a contact that he had “jacked into a police officer’s account” and acknowledged he “was not supposed to be there not one bit.”
Michael Alfonso, Acting Special Agent in Charge of Homeland Security Investigations New York, highlighted that the defendants “impersonated law enforcement, illegally accessed government databases, and even faked life-threatening situations” to obtain sensitive information.
The HSI New York El Dorado Task Force led the investigation that resulted in these convictions.
The prosecution was handled by the Office’s National Security and Cybercrime Section, with Assistant United States Attorneys Alexander Mindlin, Ellen H. Sise, and Adam Amir leading the case.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update