Showing posts with label STOLEN CREDIT CARD NUMBERS. Show all posts
Showing posts with label STOLEN CREDIT CARD NUMBERS. Show all posts

Wednesday, October 29, 2014

COMPUTER HACKER SENTENCED IN CASE INVOLVING ALTERED ACADEMIC RECORDS AND STOLEN CREDIT CARD NUMBERS

FROM:  U.S. JUSTICE DEPARTMENT
Monday, October 27, 2014

Massachusetts Man Sentenced to Four Years in Prison for Computer Hacking Involving Stolen Credit Card Numbers and Altered Academic Records
A Massachusetts man was sentenced to serve four years in prison today for hacking into computer networks around the country – including networks belonging to law enforcement agencies and a local college – to obtain highly sensitive law enforcement data and to alter academic records, as well as for possessing stolen credit and debit card numbers.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Carmen M. Ortiz of the District of Massachusetts, Special Agent in Charge Vincent Lisi of the FBI’s Boston Division and Colonel Timothy P. Alben of the Massachusetts State Police made the announcement.

Cameron Lacroix, 25, of New Bedford, Massachusetts, pleaded guilty on June 25, 2014, to two counts of computer intrusion and one count of access device fraud.  Lacroix was sentenced today by U.S. District Judge Mark L. Wolf of the District of Massachusetts.

Lacroix admitted that, between May 2011 and May 2013, he obtained and possessed payment card data for more than 14,000 unique account holders.  For some of these account holders, Lacroix also obtained other personally identifiable information.

Additionally, from August 2012 through November 2012, Lacroix repeatedly hacked into law enforcement computer servers containing sensitive information including police reports, intelligence reports, arrest warrants, and sex offender information.  In one such instance, in September 2012, Lacroix hacked into a computer server operated by a local Massachusetts police department and accessed an e-mail account belonging to the chief of police.

Lacroix, who was a student at Bristol Community College (BCC), also admitted that between September 2012 and November 2013, he repeatedly hacked into BCC’s computer servers and used stolen log-in credentials belonging to three instructors to change grades for himself and two other students.

The case was investigated by the FBI’s Boston Division Cyber Task Force.  The case is being prosecuted by Senior Trial Attorney Mona Sedky from the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Adam Bookbinder of the District of Massachusetts.

The U.S. Attorney’s Office for the Northern District of California has also filed hacking charges against Lacroix.  That case has been transferred to the District of Massachusetts and is before Chief Judge Saris.

Sunday, April 29, 2012

COURT ORDERS SEIZURE OF 36 WEB DOMAINS THAT SELL STOLEN CREDIT CARD NUMBERS


FROM:  U.S. DEPARTMENT OF JUSTICE 
Thursday, April 26, 2012
Federal Courts Order Seizure of 36 Website Domains Involved in Selling Stolen Credit Card Numbers
WASHINGTON – Seizure orders have been executed against 36 domain names of websites engaged in the illegal sale and distribution of stolen credit card numbers, Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney Neil H. MacBride of the Eastern District of Virginia and Acting Executive Assistant Director Kevin Perkins of the FBI’s Criminal, Cyber, Response and Services Branch, announced today.

The seizures are the result of Operation Wreaking hAVoC, an FBI and Justice Department operation targeting the sale of stolen credit card numbers via the Internet.  The operation was coordinated with international law enforcement, including the United Kingdom’s Serious Organised Crime Agency (SOCA).

The 36 seized domains are in the custody of the federal government.  Visitors to the sites will now find a seizure banner that notifies them that the domain name has been seized by federal authorities.

“The websites we are targeting today were commercial outlets for stolen credit card information,” said Assistant Attorney General Breuer.  “By making this information available on the Internet, these websites facilitated fraud on credit card holders around the world.  The actions announced today are the result of extraordinary coordination with our international law enforcement partners, and reflect our commitment to use every tool at our disposal to shut down fraudulent, criminal enterprises.”

“Countless lives are thrown into financial turmoil because of these websites,” said U.S. Attorney MacBride.  “With a few simple clicks, thousands of stolen credit card numbers can be bought or sold to fraudsters anywhere in the world.  Today’s seizures are part of an ongoing campaign to disrupt this online market regardless of where it operates.”
“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets,” said FBI Acting Executive Assistant Director Perkins.  “The FBI and our partners around the world are committed to disabling these criminal networks.  No single law enforcement agency can fight cyber crime on its own, and the FBI is proud to be a part of such an outstanding effort by all of the participating agencies.”

The websites of the seized domain names are commonly referred to as Automated Vending Carts (AVCs).  An AVC is a website that functions as an open-ended invitation to any visitor to purchase stolen credit card numbers.  AVCs allow a user to buy stolen credit card data over the Web, even using an online “shopping cart,” just like a traditional online retailer.  Some AVC sites allow a buyer to select which type of credit card number to purchase, the account’s country of origin, and, in some cases, the state in which the account holder lives.  AVCs allow sellers to traffic stolen credit card data without communicating directly with buyers.

During this operation, law enforcement officials made undercover purchases of credit card numbers, including credit card numbers issued by Bank of America, Sun Trust and Capital One.  The banks confirmed that the sites were not authorized to sell the credit card numbers.  Seizure orders were obtained from a federal magistrate judge in the Eastern District of Virginia.
This U.S. operation was led by FBI’s Washington Field Office, the Computer Crime and Intellectual Property and Asset Forfeiture and Money Laundering Sections of the Justice Department’s Criminal Division and the U.S. Attorney’s Office for the Eastern District of Virginia.  The FBI’s Pittsburgh Field Office and the U.S. Attorney’s Office for the Western District of Pennsylvania also assisted in the investigation.

The international operation was led by the United Kingdom’s SOCA.  The Australian Federal Police (AFP); German Bundeskriminalamt (BKA); United Kingdom’s Dedicated Cheque and Plastic Crime Unit (DCPCU); Macedonian Ministry of Interior Cyber Crime Unit (MOI); Ukraine Ministry of Internal Affairs; Romanian Ministry of Interior; and the Dutch High-Tech Crimes Unit (KLPD) provided assistance.  Activities conducted by these international law enforcement agencies included arrests of AVC operators and purchasers, additional domain seizures and data seizures.

Search This Blog

Translate

White House.gov Press Office Feed