Dutch man sentenced in US to 12 years in credit card scam
David Benjamin Schrooten, known as 'Fortezza,' in part ran Kurupt.su, a carding website
IDG News Service - A 22-year-old Dutch man who sold credit card details online was sentenced on Friday to 12 years in a U.S. prison in a fraud case that prosecutors alleged caused more than $63 million in damages, according to the Department of Justice.
David Benjamin Schrooten, who was extradited from Romania last June, was part of a team that stole more than 100,000 credit card numbers and sold the details to other criminals on Kurupt.su, a so-called "carding" website or underground marketplace for stolen payment card data. He was sentenced in U.S. District Court for the Western District of Washington in Seattle, a DOJ news release said.
Schrooten pleaded guilty in November to conspiracy to commit access device fraud and bank fraud, access device fraud, a single count of bank fraud, intentional damage to a protected computer and aggravated identity theft.
Prosecutors alleged Schrooten worked with Christopher A. Schroebel, 21, of Keedysville, Md., and Charles Tony Williamson, 33, of Torrance, Calif.
Schroebel, who was sentenced to seven years in prison after pleading guilty to five counts, hacked into the IT systems of a restaurant in Seattle and a restaurant supply store in Shoreline, Wash. He infected their computers with malicious software that recorded credit-card numbers inputted into point-of-sale systems.
Williamson, who is charged with 22 counts related to the operation, stands accused of purchasing and using the credit-card numbers. He is scheduled for trial later this year, the DOJ said.
Kurupt.su ran for about two years and had around 6,000 members who bought and sold pilfered payment card information. Schrooten, who was known by his online nickname "Fortezza," exercised tight control over who could join the secret forum.
He posted more than 1,000 notices on the forum in fluent English, booting users who ripped off other people. Schrooten was also accusing of hacking other carding forums, an effort believed to be intended to damage competitors.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts