Announcement

Collapse
No announcement yet.

11 Indicted Over Credit Card Thefts

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • 11 Indicted Over Credit Card Thefts

    By RODRIQUE NGOWI and ANNE D'INNOCENZIO, APposted: 5 HOURS 5 MINUTES AGO
    Credit, Credit Cards, Fraud, Identity Theft



    BOSTON (Aug. 6) - Authorities have cracked what is believed to be the largest federal hacking and identity theft case ever, involving the theft and sale of more than 41 million credit and debit card numbers.

    Eleven people, including a U.S. Secret Service informant, have been charged in connection with data breaches at nine major retailers, the Justice Department announced Tuesday. Three of those charged are U.S. citizens while the others are from places such as Estonia, Ukraine, Belarus and China.
    The indictment returned Tuesday by a federal grand jury in Boston alleges that the suspects hacked into the wireless computer networks of retailers including TJX Cos., BJ's Wholesale Club, OfficeMax , Boston Market, Barnes & Noble , Sports Authority, Forever 21 and DSW and set up programs that captured card numbers, passwords and account information.
    "They used sophisticated computer hacking techniques that would allow them to breach security systems and install programs that gathered enormous quantities of personal financial data, which they then allegedly either sold to others or used themselves," Attorney General Michael Mukasey said at a news conference. "And in total, they caused widespread losses by banks, retailers, and consumers."
    Mukasey called the total dollar amount of the alleged theft "impossible to quantify at this point." U.S. Attorney Michael J. Sullivan said that while most of the victims were in the United States, officials still haven't identified all the people who had a card number stolen.
    "I suspect that a lot of people are unaware that their identifying information has been compromised," he said.
    Sullivan said the alleged thieves weren't computer geniuses, just opportunists who used a technique called "wardriving," which involved cruising through different areas with a laptop and looking for accessible wireless Internet signals. Once they located a vulnerable network, they installed so-called "sniffer programs" that captured credit and debit card numbers as they moved through a retailer's processing networks.
    The information was stored on two servers in Ukraine and Latvia - one with more than 25 million credit and debit card numbers and another with more than 16 million numbers, Sullivan said.
    The heist was a black eye for retailers like TJX. The company initially disclosed the data breach in January 2007 but said a few months later that at least 45.7 million cards were exposed to possible fraud in a breach of its computer systems that began in July 2005. Court filings by some banks that sued TJX put the number of cards affected at more than 100 million, based on estimates by officials with Visa and MasterCard, who were deposed in the suit.
    In May, TJX said it won support from MasterCard-issuing banks for a settlement that will pay them as much as $24 million to cover costs from the breach. A similar agreement reached last November with Visa-card issuing banks set aside as much as $40.9 million to help banks cover costs including replacing customers' payment cards and covering fraudulent charges.
    According to the indictments unsealed Tuesday, three of the defendants are U.S. citizens, one is from Estonia, three are from Ukraine, two are from China and one is from Belarus. One individual is known only by an alias online, and his place of origin is unknown.
    At a press briefing in San Jose, Calif., Homeland Security Secretary Michael Chertoff said the non-U.S. citizens under indictment were part of an international stolen credit and debit card ring.
    The ring operated in mainly in Eastern Europe, the Phillipines, China and Thailand, and the alleged foreign conspirators remained outside the U.S., Chertoff said.
    The thefts were criminal actions committed for the personal gain of the defendants, who investigators did not consider a national security threat, Chertoff said.
    Still, he said, their alleged crimes demonstrated the weaknesses of cybersecurity in the U.S.
    "Today's indictments are a reminder of a growing threat that every American faces in the 21st century - the fact that each individual's greatest asset is their names, their identity," Chertoff said.
    In the Boston indictment, the alleged ringleader Albert "Segvec" Gonzalez of Miami was charged with computer fraud, wire fraud, access device fraud, aggravated identity theft and conspiracy. Gonzalez, who is in custody in New York, faces a maximum penalty of life in prison if he is convicted of all the charges.
    Gonzalez was a U.S. Secret Service informant who helped the agency take over a Web site being used to transmit stolen identifiers and stolen credit card numbers, U.S. Secret Service Director Mark Sullivan said at the news conference.
    "That was the first time ever that a computer system was wiretapped," he said.
    But he said the Secret Service later found out that Gonzalez had also been feeding criminals information about ongoing investigations - even warning off at least one person.
    "Obviously, we weren't happy that a person working for us as an informant was double-dealing," Mark Sullivan said.
    Indictments were also unsealed Tuesday in San Diego against Maksym "Maksik" Yastremskiy of Kharkov, Ukraine, and Aleksandr "Jonny Hell" Suvorov of Sillamae, Estonia. They are charged with crimes related to the sale of the stolen credit card data.
    Yastremskiy was arrested when he traveled to Turkey on vacation in July 2007. He is facing related Turkish charges, and U.S. officials said they have requested his extradition.
    Justice Department officials said Suvorov was arrested on the San Diego charges by German officials in March when he traveled there on vacation. He is in custody awaiting the resolution of extradition proceedings.
    Indictments against Hung-Ming Chiu and Zhi Zhi Wang, both of China, and a person known only by the online nickname "Delpiero" were also unsealed in San Diego.
    A Justice Department spokeswoman said those three suspects, together with five others, are still at large. Officials did not give an arraignment date for Gonzalez.
    In May, federal prosecutors in New York indicted Yastremskiy, Suvorov and Gonzalez on 27 counts of fraud and identity theft. The charges stemmed from allegations that they hacked into a national restaurant chain's computerized cash registers and stole credit card information from customers. Eleven Dave & Buster's restaurants around the United States suffered at least $600,000 in losses, prosecutors said.
    It was not immediately possible to reach Yastremskiy, Suvorov and Gonzalez for comment and it was not clear if they have legal representation.
    Associated Press writers Anne D'Innocenzio in New York and Marcus Wohlsen in San Jose, Calif. contributed to this report.

  • #2
    Patience Pays Off for Hackers in Web Security War

    By Brian Prince
    2008-08-06

    The hacker group behind the Coreflood Trojan has learned that patience pays, as it has stolen at least 463,582 user names and passwords while flying under the radar. At Black Hat, SecureWorks Director of Malware Research Joe Stewart discussed his research on the gang and how it has gone undetected.


    LAS VEGAS—The creators of the Coreflood Trojan have managed to stick their digital hands into the pockets of victims for years. And they have done it largely under the radar, according to research revealed at the Black Hat conference here Aug. 6.

    Some may remember the Coreflood Trojan from the well-publicized case of Joe Lopez, a Miami businessman who sued his bank for failing to protect his account after attackers wired more than $90,000 to a bank in Latvia. The masterminds behind that attack were the makers of the Coreflood Trojan, according to Joe Stewart, director of malware research at SecureWorks.

    But since that time, the minds behind Coreflood have been busy. By getting access to a Coreflood command-and-control server—since shut down—Stewart and The Spamhaus Project uncovered 50GB of mostly compressed data stolen from infected users. As much as four times that amount is believed to have been previously harvested and deleted, according to scripts left behind by the gang.

    The stolen data included 463,582 user names and passwords to more than 35,000 domains. Nearly 8,500 passwords were for banks and credit unions in the United States and overseas. In one directory, Stewart found numerous subdirectories left over from checking account validity. In one subdirectory, 740 stolen accounts were found in the configuration files. Those the hackers tested for validity had an average of $4,553.74 in savings and $2,096.31 in checking—meaning the hackers could have had access to more than $2.5 million in a single financial institution if the averages held true for the other accounts.

    So just how did the hackers manage to go seemingly undetected for so long? According to Stewart, it was by not targeting things like instant messaging or e-mail, which get a lot of attention from security vendors. Instead, the hackers relied on drive-by attacks, and would pick a hosting provider and do a mass hack of every single Web page on that particular server. Then they would wait for users—particularly domain administrators with high-level rights.

    Their approach is different from many gangs of cyber-criminals who use massive e-mail campaigns to spread their malware, as in the Storm botnet.

    “The key I think is not to spread through things that are in your face—like instant messaging, worms or e-mail worms …. [That] gets the anti-virus companies’ attention real quick,” Stewart said. “It’s much better to put out an infected Web site somewhere and let people find it. They infect one corporate user, they wait until a domain administrator logs into that workstation … and then once that malware has privileges, it just rolls out its own code just like an update to all the others on the network.”

    The group did not rely on zero-day attacks, just standard exploits that one can get from various underground forums. Its victims include hospitals, colleges, law firms and a U.S. state police agency that SecureWorks declined to identify.

    "Their trick is not in getting that initial infection—their trick is being patient and waiting for the right person to log into that workstation and then (taking) over that whole network," he said.

    Comment


    • #3
      Anyone worried about identity theft should check out getting lifelock.

      http://www.lifelock.com/

      Comment

      Working...
      X