Feeds

AOL ID thief faces 7 years

Trojan powered scam man heads for slammer

Seven Steps to Software Security

A 23 year-old faces up to seven years imprisonment after pleading guilty to targeting AOL members via an elaborate and long running phishing scam.

Michael Dolan, formerly of West Haven, Connecticut and North Miami Beach, Florida, admitted stealing names, credit card details and social security numbers from AOL members. He pleaded guilty this week to one count of conspiracy to commit fraud and one count of aggravated identity theft as part of a plea bargaining agreement with US prosecutors.

From 2002 until 2006, Dolan used unspecified software to steal AOL screen names from chat rooms. He then sent Trojan horse malware disguised as electronic greeting cards from Hallmark to these prospective marks. The malicious software prevented users with infected machines from logging onto their accounts without giving out personal information, including credit card numbers and social security details. Dolan and his partners in crime used this harvested data to make fraudulent online purchases. The details were also used to make up counterfeit cards which were used to steal money from ATMs and make purchases at petrol stations and the like.

It's unclear how much Dolan and his unidentified cohorts made via the scam.

The scheme was unearthed after an investigation involving West Haven Police Department and US ISP EarthLink’s abuse team. Following his guilty plea, Dolan faces up to five years in jail for fraud and a further mandatory two years imprisonment for aggravated ID theft. He also faces probation following his release and fines of up to $250,000. A sentencing hearing before US District Judge Alvin W. Thompson is scheduled for 14 November.

Dolan's previous form counted against him. Dolan was put on probation for two years in May 2004 after pleading guilty to hacking offences. He failed to keep appointments with his probation officer, made numerous trips out of Connecticut without permission, including at least one trip overseas. Dolan was jailed for nine months in April 2006 for violating the terms of his probation.

A DoJ statement on the case can be found here. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.