Man accused in TJX data breach pleads guilty
Damon Patrick Toey is one of 11 people arrested in the massive breach
Computerworld - One of the 11 people arrested last month in connection with the massive data theft at TJX Companies Inc., BJ Wholesale Clubs Inc. and several other retailers pleaded guilty yesterday to four felony counts, including wire and credit card fraud and aggravated identity theft.
Damon Patrick Toey is scheduled to be sentenced on Dec. 10 in U.S. District Court in Boston. He faces a maximum prison term of five years and a fine of $250,000 on each of the counts. In addition, under the terms of the plea agreement, Toey has to forfeit all of the money he earned for his role in the data theft. It is not clear how much he may have made from the attacks, although he had about $9,500 in his possession when he was arrested in May.
Toey was one of 11 alleged hackers arrested last month in connection with a series of data thefts and attempted data thefts at TJX and numerous other companies. Besides TJX and BJ's, the list of publicly identified victims of the hackers includes DSW, OfficeMax, Boston Market, Barnes and Noble, Sports Authority and Forever 21.
In a court filing yesterday, Assistant U.S. Attorney Stephen Heymann said that there is "forensic and/or testimonial evidence" that Toey and his co-conspirators broke into "numerous" other businesses that have not been publicly identified. Heymann said he would be willing to submit the full list "in camera" to the court if needed.
The ID theft ring stole data involving more than 45 million payment cards, leaving 100 or so financial institutions vulnerable to losses from fraud, Heymann said.
The breach was made public in January 2007 by Framingham, Mass.-based TJX, which later reported in a filing with the U.S. Securities and Exchange Commission that 45.6 million credit card numbers were affected -- the largest such breach on record.
The alleged thefts by Toey and his companions occurred over a five-year period, from 2003 to 2008, and were largely perpetrated -- at least, initially -- by taking advantage of vulnerabilities in the wireless networks used at retail store locations. Around mid-2007, the group, largely with the help of Toey, started launching online attacks on Web servers and databases handling payment card data. Accused gang leader Albert Gonzalez allegedly invited Toey to move into his condominium in Miami, where he stayed for free and received periodic payments in return for collaborating on the Internet-base attacks.
Many of the Internet attacks that Toey facilitated were SQL injection attacks, according to court documents.
The documents described Gonzalez, Toey and others as going "war-driving" in commercial areas of Miami looking for vulnerable retail networks they could attack. Once they broke into a network, they would locate and steal "Track 2" data from the magnetic stripe on the back of payment cards as well as PIN-block data associated with debit cards.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts