Attacks/Breaches

6/28/2017
04:14 PM
50%
50%

$71 Million Restitution Owed for Hacking, Fraud Scheme

Convicted money launderer Muhammad Sohail Qasmani is sentenced to 4 years in prison, and will share the hefty payout with other co-conspirators convicted in the conspiracy.

Pakistani citizen Muhammad Sohail Qasmani has been sentenced to 48 months in prison for laundering $19.6 million on behalf of other actors in an international computer hacking and telecommunications fraud scheme, the DoJ reports. He previously pleaded guilty to one count of conspiracy to commit wire fraud.

The massive fraud scheme, which led to losses exceeding $70 million, was allegedly led by Noor Aziz of Karachi, Pakistan, a FBI Cyber Most Wanted suspect who remains at-large. The scheme involved unauthorized access to PBX systems that ran through the internal phone networks of several organizations across the United States.

Hackers targeted victims' phone systems, which were illegally reprogrammed to make calls to long-distance locations and premium numbers to generate revenue. Qasmani laundered proceeds for Aziz and set up bank accounts to receive funds generated by fraudulent calls.

In addition to his prison sentence, Qasmani must pay a $25,000 fine and share restitution of $71,761,956.34 -- the total amount lost in the scheme.

All players convicted in the conspiracy are jointly responsible for the full amount, the DoJ explains. The balance will remain open until paid, whether it's by one member or several.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2017 | 9:32:14 AM
Aziz
Where they able to apprehend Aziz or is this individual still at large?
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-5236
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard). This type of issue occurs in software where the output is dependent on the sequence or timing of other uncontrollable events.
CVE-2018-5237
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
CVE-2018-6211
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi.
CVE-2018-6212
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, a reflected Cross-Site Scripting (XSS) attack is possible as a result of missed filtration for special characters in the "Search" field and incorrect proc...
CVE-2018-6213
PUBLISHED: 2018-06-20
In the web server on D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, there is a hardcoded password of anonymous for the admin account.