Careers & People

12/2/2016
10:50 AM
50%
50%

Dark Web Vendor Gets 50 Months Jail For ID Theft

Minnesota resident Aaron Glende aka IcyEagle caught selling stolen bank details on AlphaBay market.

A resident of Minnesota has been sentenced to 50 months in prison for identity theft and selling personal data of victims on the Dark Web cybercrime marketplace AlphaBay, says the US Department of Justice (DoJ).

Between November 2015 and May 2016, Aaron James Glende was reportedly found operating on AlphaBay under the name IcyEagle, with 300 listings advertising stolen bank logins and other confidential details.

A DoJ release says an undercover FBI agent, posing as a buyer, tracked Glende down on the Dark Web, where all types of stolen goods are sold under hidden identities. When arrested, Glende was said to be in possession of 944 stolen bank account usernames and passwords, 386 credit card numbers, 123 bank account numbers, and more.

For details, read DoJ release.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mergatroyds
50%
50%
mergatroyds,
User Rank: Apprentice
12/3/2016 | 8:37:14 PM
Prison Terms
Guy gets 50 months.  Time off for good behaviour?  Do not think 2 years is enough.  Hope there is a long probation/parole time which forbids any contact with the Internet.
jcavery
100%
0%
jcavery,
User Rank: Moderator
12/3/2016 | 1:51:31 PM
Sentencing Calculation
Very interested in how they are calculating the sentence for these types of crimes..not criticizing, just genuinely curious. Will it get more severe in the future, or more lenient? Do you all think 50 months was appropriate?
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.