Attacks/Breaches

12/19/2011
12:08 PM
50%
50%

Feds Indict 55 For Cyber Crime Fraud

Crime ring recruited insiders to steal personal information on hundreds of people, which they used to open fake accounts and steal money.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Federal authorities Friday announced the indictment of 55 people for participating in a cyber crime fraud ring that relied on insiders to steal hundreds of people's personal details from a bank and a car dealer, among other organizations. The stolen information was then used to defraud both the victims, as well as the organizations at which the insiders worked.

"These insiders used their positions to gain access to client data, and then sold that data to make money for themselves and their accomplices," said Manhattan District Attorney Cyrus R. Vance, Jr., in a statement.

All told, the various defendants--charged in five separate indictments--stole information relating to 200 people or organizations, and in many cases used the stolen information more than once. Authorities have accused the defendants of stealing more than $2 million just from financial institutions, including American Express, Chase Bank, Citibank, Discover, and TD Bank. The charges relates to crimes allegedly committed between May 2010 and September 2011.

[ Law enforcement is becoming more aggressive when it comes to cyber crime. Read California Forms Cyber Crime Unit. ]

Authorities said the arrests were part of an 18-month investigation, which remains ongoing. During the course of that investigation, the New York Police Department's Financial Crimes Task Force, the Manhattan District Attorney's Office, as well as investigators from other agencies, including the U.S. Postal Service, employed "court-ordered eavesdropping, physical surveillance, computer forensics, and extensive analysis of credit card, banking, and phone records" to trace the crimes back to the accused.

"The checks didn't bounce but they left a bread crumb trail right back to the suspects," said N.Y. Police Commissioner Raymond W. Kelly, in a statement.

According to court documents, members of a cyber crime ring recruited "at least four insiders to steal, sell, exchange, and fraudulently use the stolen personal identifying information of donors, customers, and tenants from the organizations where they worked."

According to court documents, the insiders worked for four different organizations. The insider at the Audi dealer, Roberto Millar, allegedly stole personally identifying information on at least 900 people. Tracey Nelson, a three-year employee of the non-profit United Jewish Appeal-Federation (UJA), allegedly stole personal data relating to hundreds of donors. Nicola Bennett, a compliance officer for AKAM Associates, a residential property management company in New York, is accused of stealing information relating to at least a dozen people. Finally, Karen Chance, a bank teller at a branch of Chase Bank, has been accused of illegally accessing multiple people's bank account details.

According to court documents, after the insiders sold the stolen information to the cyber crime ring, the ring either put the information to use itself, or sold it to other criminals, who used it to create counterfeit checks and commit various other types of fraud. To do so, however, the defendants needed to obtain "valid bank accounts through which the recruiters and their confederates could commit fraud," said authorities. "The recruiters would use their accounts to deposit counterfeit checks or conduct fraudulent monetary transfers."

To make this happen, the cyber crime ring allegedly also recruited two Chase Bank tellers--Mercy Adebandjo and Joanna Gierczack--who helped the thieves conduct fraudulent transactions, while avoiding the bank's anti-fraud and anti-money laundering controls.

Meanwhile, to facilitate rapid withdrawals from the valid bank accounts they'd obtained, the cyber crime ring would allegedly often purchase U.S. Postal Service money orders, using debit cards linked to the accounts. The gang also relied on counterfeit check makers--with payments made out to the owners of the improperly obtained accounts.

In some cases, defendants allegedly used the stolen information to change the contact details for credit cards to an address where one of the defendants, Richard Ramos, a United Parcel Service employee, could intercept the mailings. He then allegedly provided the cards to other defendants, in return for money.

Authorities have also accused some of the defendants of using the stolen personal information to order credit reports for those people. These reports, they said, gave the defendants crucial details for helping to answer security questions when they then attempted to open new accounts or credit cards in the victims' names.

Database access controls keep information out of the wrong hands. Limit who sees what to stop leaks--accidental and otherwise. Also in the new, all-digital Dark Reading supplement: Why user provisioning isn't as simple as it sounds. Download the supplement now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Tom LaSusa
50%
50%
Tom LaSusa,
User Rank: Apprentice
12/19/2011 | 7:59:14 PM
re: Feds Indict 55 For Cyber Crime Fraud
Whatever the sentences/punishments are for cyber criminals, frankly I don't think they are enough. People spend years trying to undo the damage done to their credit and reputation, often with little success. There needs to be the threat of serious jail time in order to deter this activity.

Tom LaSusa
InformationWeek
Bprince
50%
50%
Bprince,
User Rank: Ninja
12/19/2011 | 11:16:38 PM
re: Feds Indict 55 For Cyber Crime Fraud
I think the use of insiders here is particularly troubling. There was another bust not too long ago that involved insiders working in retail establishments stealing credit card information so that another part of the operation could make fake cards. Makes me wonder if there is more retail businesses should be doing as far screening potential employees and detecting malicious behavior than they are currently.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.