Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/16/2020
03:00 PM
50%
50%

Five Indicted on Romance and Lottery Fraud Charges

Fraudsters allegedly targeted elderly victims, ultimately wringing more than $4 million from their bank accounts.

Five men from Connecticut have been indicted on 11 counts stemming from their alleged involvement in a romance and lottery fraud that took more than $4 million from victims. According to the indictment, the fraud schemes began in August 2015 and continued until the time of the arrests last week.

The criminals are said to have targeted the elderly, ultimately taking more than $1 million from a single victim. As part of the schemes, victims either sent checks, money orders, or gift cards to addresses in Connecticut, or they wired money to bank accounts controlled by the five perpetrators.

The individuals arrested were Farouq Fasasi, Rodney Thomas, Jr., Montrell Dobbs, Jr., Stanley Pierre, and Ralph Pierre. Fasasi, Thomas, Dobbs, and Ralph Pierre were arrested on March 10. Dobbs has been released on bond, while Stanley Pierre is still being sought by law enforcement.

All of the defendants are charged with one count of conspiracy to commit money laundering, a charge that carries a maximum term of imprisonment of 10 years. The indictment also charges Fasasi and Thomas with one count of conspiracy to commit mail and wire fraud and one count of mail fraud, each of which carries a maximum term of imprisonment of 20 years. In addition, Fasasi, Dobbs, Stanley Pierre, and Ralph Pierre are charged with one or more counts of money laundering, which carries a maximum term of imprisonment of 10 years on each count.

Read more here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Beyond Burnout: What Is Cybersecurity Doing to Us?"

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11059
PUBLISHED: 2020-05-27
In AEgir greater than or equal to 21.7.0 and less than 21.10.1, aegir publish and aegir build may leak secrets from environment variables in the browser bundle published to npm. This has been fixed in 21.10.1.
CVE-2020-10936
PUBLISHED: 2020-05-27
Sympa before 6.2.56 allows privilege escalation.
CVE-2020-6774
PUBLISHED: 2020-05-27
Improper Access Control in the Kiosk Mode functionality of Bosch Recording Station allows a local unauthenticated attacker to escape from the Kiosk Mode and access the underlying operating system.
CVE-2020-13633
PUBLISHED: 2020-05-27
Fork before 5.8.3 allows XSS via navigation_title or title.
CVE-2020-10945
PUBLISHED: 2020-05-27
Centreon before 19.10.7 exposes Session IDs in server responses.