Feeds

Pump and dump scam hacker banged up

US stock market manipulated by Asian crackers

The Essential Guide to IT Transformation

An Indian man convicted of hacking into internet brokerage accounts to manipulate stock prices has been jailed in the US for two years.

Thirugnanam Ramanathan, 35, originally of Chennai, India, broke into customer investment accounts held with brokerages including TD Ameritrade, Fidelity and E*Trade. He dumped existing holdings and used the funds to buy lightly-traded stock, thereby increasing its price.

Prior to the move, Ramanathan and his alleged accomplices had bought stock in the same little regarded firms, allowing them to sell the shares at a tidy profit after its value had been artificially inflated. At least 60 customers with nine US brokerage firms fell victim to the scam, which operated between February and December 2006.

Ramanathan pleaded guilty to one count of conspiracy to commit wire fraud, securities fraud, computer fraud and aggravated identity theft over the scam back in June. At a sentencing hearing before US District Judge Laurie Smith Camp, he was ordered to pay restitution of $362,000 and to serve three years on probation in addition to his main sentence of two years behind bars.

Conventional pump and dump scams rely on attempting to trick would-be investors into pumping money into essentially worthless stock on the basis of false rumours spread using spam email. The scam orchestrated by Ramanathan is more sophisticated because it involved an element of hacking.

Ramanathan was cuffed in Hong Kong, and extradited following an FBI investigation that traced one of the instances of stock manipulation back to an IP address used by a Bangkok Hotel he was staying in at the time. Two other suspects - named as Jaisankar Marimuthu, 33, and Chockalingham Ramanathan, 34 - have also been charged (pdf). Marimuthu is awaiting extradition from Hong Kong while Ramanathan remains at large.

More background on the case can be found in a US Department of Justice press release here. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.