Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/9/2018
12:45 PM
50%
50%

Guilty Plea Made in Massive International Cell Phone Fraud Case

A former West Palm Beach resident is the fifth defendant to plead guilty in a case involving thousands of victims.

Penalties in a global cell phone fraud scheme continue to mount as a fifth defendant has pleaded guilty in connection to the case. Braulio De la Cruz Vasquez, a 54-year-old former resident of West Palm Beach, Fla., entered pleas in the Southern District of Florida.

De la Cruz pleaded guilty to one count of wire fraud, one count of aggravated identity theft, and one count of conspiracy to commit wire fraud, access device fraud, the use, production or possession of modified telecommunications instruments and the use or possession of hardware or software configured to obtain telecommunications services.

According to the US Department of Justice, the scheme involved stealing access to existing cell phone accounts, then fraudulently opening new accounts based on the information. In his admission of guilt, De la Cruz said that thousands of international calls would be routed via the internet to his residence, where phones programmed with the fraudulent accounts would be used to place the calls to countries such as Cuba, Jamaica, and the Dominican Republic, while the charges were billed to the original customers' accounts.

De la Cruz received amounts in the tens of thousands of dollars from VoIP companies for routing the calls. Sentencing is scheduled for Jan. 18, 2019; others in the case have already received sentences of 36 to 75 months for their roles in the scheme.

For more, read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19740
PUBLISHED: 2019-12-12
Octeth Oempro 4.7 allows SQL injection. The parameter CampaignID in Campaign.Get is vulnerable.
CVE-2019-19746
PUBLISHED: 2019-12-12
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
CVE-2019-19748
PUBLISHED: 2019-12-12
The Work Time Calendar app before 4.7.1 for Jira allows XSS.
CVE-2017-18640
PUBLISHED: 2019-12-12
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CVE-2019-19726
PUBLISHED: 2019-12-12
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from th...