Six charged in case of AOL identity theft ring
Alleged scam conducted over two-year period
IDG News Service - Six men have been charged with orchestrating a phishing scheme that targeted AOL users, the Department of Justice said Wednesday.
The men are accused of harvesting thousands of AOL e-mail addresses and then infecting victims' PCs with malicious software that would prevent them from logging onto AOL without entering their credit card numbers, bank account numbers and other personal information.
Under the scam, victims received fake e-mail greeting cards that would silently infect their computers with the log-on software, according to a grand jury indictment. Victims were also spammed with phoney e-mail messages that claimed to have come from AOL's billing department.
"Due to a central server meltdown, your credit card information was lost," one such e-mail read, according to the indictment. "In order to enjoy your AOL experience and keep your account active, you must enter your credit card information within 24 hours."
Some of the fake greeting cards claimed to come from Web sites such as Hallmark.com or BlueMountain.com, the indictment states.
AOL users appear to have been the primary targets of the fraud, but others may also have been targeted, according to Tom Carson, a spokesman for the United States Attorney's office for the District of Connecticut. "The investigation is ongoing," he said. "I think we can say the bulk of those targeted were AOL users, but we can't say with 100% certainty that they were the only victims," he said.
The accused are believed to have defrauded thousands of people , U.S. Attorney Kevin O'Connor said in a statement. "These are insidious crimes that wreak havoc on the lives of victims, and we will seek strict terms of imprisonment."
The alleged scam was conducted over a two-year period, beginning in 2004, the U.S. attorney said.
Proceeds from the crime were used to purchase gaming consoles, laptop computers and gift cards, the indictment states.
The men were actually indicted on fraud charges last week by a federal grand jury in New Haven, Conn., but the charges were not made public until Wednesday, when three of the men pleaded guilty.
The three who have pleaded guilty face between two years and nine and a half years in prison, Carson said. They are Charlie Blount Jr., 22, of Branford, Conn., Richard D'Andrea, 22, of West Haven, Conn., and Thomas Taylor Jr., 20, also of West Haven. They are scheduled to be sentenced in mid-December.
The three men awaiting arraignment are Michael Dolan, 22, of North Miami Beach, Fla., Keith Riedel, 20, of Winter Haven, Fla., and Daniel Mascia, 22, of West Haven.
Dolan had previously been sentenced to two years of probation after pleading guilty to accessing a protected computer without authorization.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts