Feeds

Feds charge 11 in TJX ID fraud case

Nine companies, 40m card accounts hacked

Boost IT visibility and business value

Federal prosecutors announced on Tuesday that they had indicted eleven people in the largest case of identity theft and hacking ever prosecuted by the US Department of Justice. The eleven suspects, including three US citizens, allegedly took part in stealing more than 40 million credit and debit card accounts from nine major retailers and restaurants, including TJX Companies, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Forever 21 and DSW. The Dave & Busters and Boston Market restaurant chains were also among the victims, prosecutors stated.

"While technology has made our lives much easier it has also created new vulnerabilities," Michael J. Sullivan, US Attorney for the District of Massachusetts, said in a statement announcing the indictments. "This case clearly shows how strokes on a keyboard with a criminal purpose can have costly results."

The crimes the eleven have been charged with have made headlines over the past three years. In January 2007, retail giant TJX companies - which operates TJ Maxx and Marshalls stores - announced that unknown identity thieves had stolen more than 46.5 million credit cards, a number later found to be at least twice as high. A year earlier, some industry watchers ascribed a rise in debit-card fraud to retailers OfficeMax and Sam's Club.

An indictment returned by a federal grand jury in Boston on Tuesday charged Albert Gonzalez of Miami with computer fraud, wire fraud, access device fraud, aggravated identity theft and conspiracy for his role in the scheme. Christopher Scott and Damon Patrick Toey, both of Miami, were charged in additional documents. Eight other foreign nationals living outside the United States were charged in indictments unsealed in San Diego, according to prosecutors.

"They used sophisticated computer hacking techniques, breaching security systems and installing programs that gathered enormous quantities of personal financial data, which they then allegedly sold to others or used themselves," US Attorney General Michael Mukasey said in prepared remarks. "And in total, they caused widespread losses by banks, retailers, and consumers."

The alleged thieves used wireless scanners to find stores with vulnerable networks and then collected data using network sniffers to capture credit-card numbers, PINs and other account information. The ID theft ring then allegedly stored the stolen information on encrypted servers in Eastern Europe and the United States, selling some of the accounts to other criminals.

The alleged members of the ring converted the data to cash by creating counterfeit credit and debit cards with the information and using the cards to withdraw "tens of thousands of dollars at a time from ATMs," prosecutors said in a statement announcing the indictments. Digital currency services were used to launder the proceeds.

The case also underscores the international nature of cybercrime, prosecutors said. While three of the defendants are US citizens, the others come from outside the United States, including Estonia, Ukraine, the People’s Republic of China and Belarus. One of the alleged thieves is only known by an online pseudonym and continues to elude authorities.

The San Diego indictments charge the remaining eight foreign nationals with operating an international distribution ring for stolen credit and debit card accounts from Belarus, Estonia, the People's Republic of China, the Philippines, Thailand and Ukraine.

"So far as we know, this is the single largest and most complex identity theft case ever charged in this country," said Mukasey. "It highlights the efforts of the Justice Department to fight this pernicious crime and shows that, with the cooperation of our law enforcement partners around the world, we can identify, charge and apprehend even the most sophisticated international computer hackers."

The lead defendant, Albert Gonzalez, had already been arrested by US law enforcement for access device fraud in 2003, prosecutors said. During the current investigation, Gonzalez had been working as a confidential informant, but the Secret Service claimed that it had discovered that he was criminally involved in the case.

US law enforcement has thrown the book at Gonzalez - if convicted of the charges he could be sentenced to life in prison, according to prosecutors.

This article originally appeared in Security Focus.

Copyright © 2008, SecurityFocus

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
German government orders local CIA station chief to pack his bags
Sour Krauts arrest second local in domestic spy ring probe
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
LibreSSL crypto library leaps from OpenBSD to Linux, OS X, more
First cross-platform version of cleaned-up OpenSSL fork
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
Adobe Flash: The most INSECURE program on a UK user's PC
XML a weak spot, but nothing's as dire as Adobe player
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximizing your infrastructure through virtualization
Virtualization continues to be one of the most effective ways to consolidate, reduce cost, and make data centers more efficient.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.