Feeds

Feds charge 11 in TJX ID fraud case

Nine companies, 40m card accounts hacked

SANS - Survey on application security programs

Federal prosecutors announced on Tuesday that they had indicted eleven people in the largest case of identity theft and hacking ever prosecuted by the US Department of Justice. The eleven suspects, including three US citizens, allegedly took part in stealing more than 40 million credit and debit card accounts from nine major retailers and restaurants, including TJX Companies, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Forever 21 and DSW. The Dave & Busters and Boston Market restaurant chains were also among the victims, prosecutors stated.

"While technology has made our lives much easier it has also created new vulnerabilities," Michael J. Sullivan, US Attorney for the District of Massachusetts, said in a statement announcing the indictments. "This case clearly shows how strokes on a keyboard with a criminal purpose can have costly results."

The crimes the eleven have been charged with have made headlines over the past three years. In January 2007, retail giant TJX companies - which operates TJ Maxx and Marshalls stores - announced that unknown identity thieves had stolen more than 46.5 million credit cards, a number later found to be at least twice as high. A year earlier, some industry watchers ascribed a rise in debit-card fraud to retailers OfficeMax and Sam's Club.

An indictment returned by a federal grand jury in Boston on Tuesday charged Albert Gonzalez of Miami with computer fraud, wire fraud, access device fraud, aggravated identity theft and conspiracy for his role in the scheme. Christopher Scott and Damon Patrick Toey, both of Miami, were charged in additional documents. Eight other foreign nationals living outside the United States were charged in indictments unsealed in San Diego, according to prosecutors.

"They used sophisticated computer hacking techniques, breaching security systems and installing programs that gathered enormous quantities of personal financial data, which they then allegedly sold to others or used themselves," US Attorney General Michael Mukasey said in prepared remarks. "And in total, they caused widespread losses by banks, retailers, and consumers."

The alleged thieves used wireless scanners to find stores with vulnerable networks and then collected data using network sniffers to capture credit-card numbers, PINs and other account information. The ID theft ring then allegedly stored the stolen information on encrypted servers in Eastern Europe and the United States, selling some of the accounts to other criminals.

The alleged members of the ring converted the data to cash by creating counterfeit credit and debit cards with the information and using the cards to withdraw "tens of thousands of dollars at a time from ATMs," prosecutors said in a statement announcing the indictments. Digital currency services were used to launder the proceeds.

The case also underscores the international nature of cybercrime, prosecutors said. While three of the defendants are US citizens, the others come from outside the United States, including Estonia, Ukraine, the People’s Republic of China and Belarus. One of the alleged thieves is only known by an online pseudonym and continues to elude authorities.

The San Diego indictments charge the remaining eight foreign nationals with operating an international distribution ring for stolen credit and debit card accounts from Belarus, Estonia, the People's Republic of China, the Philippines, Thailand and Ukraine.

"So far as we know, this is the single largest and most complex identity theft case ever charged in this country," said Mukasey. "It highlights the efforts of the Justice Department to fight this pernicious crime and shows that, with the cooperation of our law enforcement partners around the world, we can identify, charge and apprehend even the most sophisticated international computer hackers."

The lead defendant, Albert Gonzalez, had already been arrested by US law enforcement for access device fraud in 2003, prosecutors said. During the current investigation, Gonzalez had been working as a confidential informant, but the Secret Service claimed that it had discovered that he was criminally involved in the case.

US law enforcement has thrown the book at Gonzalez - if convicted of the charges he could be sentenced to life in prison, according to prosecutors.

This article originally appeared in Security Focus.

Copyright © 2008, SecurityFocus

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.