Feeds

FBI-led probe nets phishing gang

That's trawl folks

Secure remote control for conventional and virtual desktops

Seventeen members of an alleged international phishing and carding gang have been arrested in the US and Eastern Europe following an FBI investigation.

Eastern European fraudsters are alleged to have run a series of identity theft scams targeting customers of major financial institutions between August and October 2004. These fraudsters sold on the personal details of marks to their US accomplices, who plundered compromised bank accounts and traded in stolen credit card information.

The arrests in Poland and the US came as part of an ongoing FBI investigation code-named Operation Cardkeeper. FBI investigators worked with local police in Poland and Romania to investigate the trade of stolen credit card information online, obtained through various phishing scams.

The alleged ringleader of the gang, a Pole called Mateusz Rymski (AKA Blindroot), is suspected of hacking into the systems of third party firms and renting out their web space to other fraudsters. So far four arrests have been made in the US and 13 in Poland as part of the investigation.

Wired reports that three of the four US suspects were caught with cards and MSR-206 machines used to encode data onto blank credit cards. One was caught trying to flush counterfeit credit cards down the toilet.

Investigators have identified tens of thousands of compromised credit card numbers and thousands of purloined identities in the course of the investigation. The extent of fraudulent losses caused by the gang remains unclear.

Further arrests in the US and Romania, where three search warrants were executed, are expected to follow. The Romanians are suspected of creating the key-logging Trojan software used in the scam. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?