Hacker Indicted For Stealing 130 Million Credit CardsHacker Indicted For Stealing 130 Million Credit Cards
A Miami resident and two unnamed co-conspirators have been indicted for hacking major retailers and stealing credit card data.
August 17, 2009
A federal grand jury has indicted Albert Gonzales, 28, of Miami, Fla., for allegedly hacking into computers belonging to retail and financial companies and stealing more than 130 million credit and debit cards.
Gonzales, known online by the nicknames "segvec," "soupnazi" and "j4guar17," and two unidentified co-conspirators located in or near Russia, are charged with conducting SQL injection attacks on corporate computer networks.
The U.S. Department of Justice says the indictment represents the largest data breach indictment ever brought in the United States.
"This investigation marks the continued success of law enforcement in tracking down cutting edge hacking schemes committed by hackers working together across the globe," said Acting U.S. Attorney Ralph J. Marra, Jr. in a statement.
The companies hit by the alleged hackers are known for being compromised in some of the biggest data breaches in recent years have been reported. They include: Heartland Payment Systems, 7-Eleven, and Hannaford Brothers.
Two other major U.S. retail companies are mentioned in the indictment but they are identified only has "Company A" and "Company B," presumably because they are not under an obligation to publicly report the breaches attributed to the alleged hackers.
Gonzales was indicted in New York in May, 2008, and in Massachusetts in August, 2008, for alleged involvement in the theft of over 40 million credit and debit cards from other companies including TJX Companies, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21, DSW and the Dave & Buster's restaurant chain.
He has pleaded not guilty to those charges.
The indictment claims Gonzales and alleged co-conspirators relied on sophisticated techniques to avoid detection, like connecting to corporate computers through proxy servers, testing approximately 20 different antivirus programs to determine whether their malware might be detected, and using malware that attempted to erase signs of its presence.
The defendants face a possible sentence of up to 35 years in prison and either $1 million or twice any ill-gotten gains in fines if convicted.
InformationWeek Analytics has published an independent analysis on data-loss prevention. Download the report here (registration required).
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023