IDG News Service - An Indian man has pleaded not guilty to charges that he hacked into online brokerage accounts in order to manipulate stock prices.
Jaisankar Marimuthu, 34, of Chennai, was extradited to the U.S. from Hong Kong on June 20, making him the latest to face charges in what authorities described as an international "hack, pump and dump" scheme. He entered a not guilty plea in U.S. District Court for the District of Nebraska on June 25, according to court records.
Marimuthu had already been arrested by Hong Kong police on similar charges, the U.S. Department of Justice (DoJ) said.
Another man, Thirugnanam Ramanathan, pleaded guilty to fraud charges stemming from the scheme and was sentenced to two years in prison in September. However, he was deported on Jan. 29, before serving his full sentence, according to Ian McCaleb, a DoJ spokesman.
A third man, Chockalingam Ramanathan, has been charged in the U.S. but is still at large, McCaleb said.
The three were charged two years ago for a 2006 scheme in which they allegedly hacked into online brokerages or created new accounts using stolen identities, then bought and sold stocks in order to manipulate prices to their benefit.
They hacked into more than 60 accounts in nine brokerage firms, including ETrade and TD Ameritrade, according to authorities. One firm lost more than US$2 million because of the scam.
The men allegedly drove up prices of low-volume stocks they owned, such as Acordia Therapeutics, Pacel and IGI, by buying shares with the hacked accounts, then dumping the stocks before the price dropped, authorities said. In October 2006, they also manipulated the price of near-worthless "put" options for Google, which gave buyers the option of selling Google stock for $240 (about half its value at the time), authorities said.
How Marimuthu and his associates allegedly gained access to the brokerage accounts is unclear, but court filings suggest that he may have obtained them from Internet cafés used by American and European visitors to Bangkok. Marimuthu and the others stayed at the Raja Hotel in Bangkok in 2006, prosecutors said.
Wireless networks at hotels and Internet cafés can be a security risk, especially if they are unencrypted or use the cracked Wired Equivalent Privacy (WEP) system to secure network traffic.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts