Update: Eleven indicted in massive ID theft scheme
Indictment alleges that TJX, DSW, other mega-breaches have connections
IDG News Service - Eleven people have been charged or indicted in a massive identity theft and computer fraud scheme involving some of the largest data breaches in recent U.S. history, the Department of Justice announced Tuesday.
The participants in the scheme targeted nine U.S. retailers, including BJ's Wholesale Club, TJX and DSW Shoe Warehouse, DoJ officials said. Those three retailers all announced large data breaches between 2004 and 2007. OfficeMax, Barnes & Noble, Boston Market, Sports Authority and Forever 21 also were targeted.
The ID theft ring stole more than 40 million credit and debit card numbers, said Michael Sullivan, U.S. attorney for the District of Massachusetts. The criminals installed sophisticated "sniffer" programs on the retailers' networks, allowing them to collect credit card and password information, he said during a press conference.
This case is believed to be the largest hacking and ID theft case the DoJ has ever prosecuted, said U.S. Attorney General Michael Mukasey.
"This case highlights our increasing vulnerability to the theft of personal information," he added during a press conference. "Computer networks and the Internet are an indispensable part of the world economy. But even as they provide extraordinary opportunities for legitimate commerce and communication, they also provide extraordinary opportunities for criminals. Where criminals are able to breach computer security systems, as alleged here, they have enormous ability to cause harm."
On Tuesday, a federal grand jury in U.S. District Court for the District of Massachusetts indicted Albert "Segvec" Gonzalez of Miami on charges of computer fraud, wire fraud, access device fraud, aggravated identity theft and conspiracy for his role in the scheme.
The DOJ also announced charges Tuesday against Christopher Scott and Damon Patrick Toey, both of Miami.
Other defendants face numerous charges in California and New York, the DOJ said.
Three of the defendants are U.S. citizens, one is from Estonia, three are from Ukraine, two are from China and one is from Belarus, the DOJ said. One individual is only known by an online alias, and his place of origin is unknown.
After collecting the data, the defendants allegedly concealed it in encrypted servers they controlled in Eastern Europe and the U.S., the DOJ said. They allegedly sold some of the credit and debit card numbers on the Internet to other criminals. The stolen numbers were cashed out by encoding card numbers on the magnetic strips of blank cards.
The defendants then used these cards to withdraw tens of thousands of dollars at a time from cash machines, the DOJ said. Gonzalez and others were allegedly able to conceal and launder their fraud proceeds by using anonymous Internet-based currencies and by channeling funds through bank accounts in Eastern Europe, the DOJ said.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency... All Cybercrime and Hacking White Papers | Webcasts