Incidents

Christopher Scott2008-12-12 00:00:00 UTC

First, Gonzalez, Toey, and Scott went wardriving around Miami, in commercial areas such as the area around U.S. 1, identifying vulnerable wireless networks. They targeted large retailers, "including, but not limited to" BJs Wholesale Club, DSW, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, and TJX. After infiltrating their networks, they began locating and stealing sensitive files and data, including credit card numbers. At this point, they are just punks. This type of break-in is a dime a dozen. But then they took it further. It says they went on to install sniffer programs, monitoring and stealing password and account information as well as track 2 data. The conspiracy broadened as they had to bring in new associates to help with decrypting the encrypted PIN numbers on their tens of millions of Track 2 reads. The stolen data was stored on servers in Latvia, the Ukraine, and the United States, and encrypted to prevent access by others. From there, the data was sold in "dumps", cashed out, and the money was redistributed, using webmoney, ATMs, and in some cases even mailing express packages full of cash to drop boxes! Regarding their technical skills, custom SQL injection attacks were developed to take on particularly desirable web sites. The attacks were mounted against a variety of database-driven web sites to find additional track 2 data, internal accounts, and files of large businesses.

Damon Toey2008-12-12 00:00:00 UTC

First, Gonzalez, Toey, and Scott went wardriving around Miami, in commercial areas such as the area around U.S. 1, identifying vulnerable wireless networks. They targeted large retailers, "including, but not limited to" BJs Wholesale Club, DSW, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, and TJX. After infiltrating their networks, they began locating and stealing sensitive files and data, including credit card numbers. At this point, they are just punks. This type of break-in is a dime a dozen. But then they took it further. It says they went on to install sniffer programs, monitoring and stealing password and account information as well as track 2 data. The conspiracy broadened as they had to bring in new associates to help with decrypting the encrypted PIN numbers on their tens of millions of Track 2 reads. The stolen data was stored on servers in Latvia, the Ukraine, and the United States, and encrypted to prevent access by others. From there, the data was sold in "dumps", cashed out, and the money was redistributed, using webmoney, ATMs, and in some cases even mailing express packages full of cash to drop boxes! Regarding their technical skills, custom SQL injection attacks were developed to take on particularly desirable web sites. The attacks were mounted against a variety of database-driven web sites to find additional track 2 data, internal accounts, and files of large businesses.

Dzmitry Burak2008-12-12 00:00:00 UTC

Sergey Storchak2008-12-12 00:00:00 UTC

Hung-Ming Chiu2008-12-12 00:00:00 UTC

Zhi Wang2008-12-12 00:00:00 UTC

Unknown 2008-12-12 00:00:00 UTC

Sergey Pavolvich2008-12-12 00:00:00 UTC

Kevin Stewart2008-11-08 00:00:00 UTC

Accused of breaking in to AIG systems and stealing over 900.000 personal credentials then attempting to extort them for 208,000.

Dmitriy Guzner2008-10-01 00:00:00 UTC

Arrested for Jan 2008 attacks on Church of Scientology where Anonymous members gathered together and used web attack tool loic.

Renukanth Subramaniam2008-10-01 00:00:00 UTC

was raided in London in June 2007 after detectives Serious Organised Crime Agency in Britain staked out the Internet café he used as an office, matching his appearances at the Java Bean with JiLsi’s posts on DarkMarket and his chats with Master Splyntr who was an under cover agent.

John McHugh2008-10-01 00:00:00 UTC

accused of making and selling cards on darkmarket

Erkan Findikoglu2008-10-01 00:00:00 UTC

Adewale Taiwo2008-10-01 00:00:00 UTC

one of two major players from the darkmarket forums in the united kingdom.

Ehud Tenenbaum2008-09-01 00:00:00 UTC

After serving time in 2001 for hacking offences Tenenbaum is now charged with six counts of Credit card fraud, in the sum of approx. US$1.5 million.[11] U.S. investigators suspected Tenenbaum of being part of a scam, in which the hackers penetrated financial institutions around the world to steal credit card numbers. They then sold these numbers to other people, who used them to perpetrate massive credit card fraud.

Priscilla Mastrangelo2008-09-01 00:00:00 UTC

card runner for Tenenbaum

Jean Ralph2008-09-01 00:00:00 UTC

card runner for Tenenbaum

Spyros Xenoulis2008-09-01 00:00:00 UTC

card runner for Tenenbaum

Joshua Holly2008-08-20 00:00:00 UTC

According to an affidavit, Holly admitted to the FBI that beginning in 2005 he had hijacked numerous celebrity internet accounts to conduct spamming. An investigation of his bank records showed that between November 2007 and July 2008, he received more than $110,000 from companies for spamming on their behalf. Holly told Threat Level that half of his illicit income went to an accomplice in Israel who used the online nickname elul21 Elul is the Hebrew name of a month on the Jewish calendar. Holly also said that the celebrity MySpace accounts he accessed to conduct his spamming activity belonged mainly to recording artists and groups — Chris Brown, Rihanna, Linkin Park, Fall Out Boy. He accessed about 20 accounts. Once he had passwords to the accounts, he used the accounts to send bulletins to all of the friends on the MySpace accounts advertising a ringtone or call service for the recording artist. For example, he’d send out a bulletin from Fall Out Boy’s MySpace account telling fans that the band would call their phone and send them a ringtone if they clicked on a link and entered their details. Holly said the advertising affiliates he worked for paid him between $5 and $12 per person who responded to the ad. The affiliates didn’t know he was spamming customers, he said, and, when they found out, they terminated their work with him and refused to pay him outstanding earnings.

Unknown 2008-05-17 00:00:00 UTC

Accused member of defacement group D.O.M.

Unknown 2008-05-17 00:00:00 UTC

Accused member of defacement group D.O.M.

Unknown 2008-05-17 00:00:00 UTC

Accused member of defacement group D.O.M.

Unknown 2008-05-17 00:00:00 UTC

Accused member of defacement group D.O.M.

Unknown 2008-05-17 00:00:00 UTC

Accused member of defacement group D.O.M.

Albert Gonzalez2008-05-07 00:00:00 UTC

on charges stemming from hacking into the Dave & Busters corporate network from a point of sale location at a restaurant in Islandia, New York. The incident occurred in September 2007. About 5,000 card numbers were stolen. Fraudulent transactions totaling $600,000 were reported on 675 of the cards.[12] Authorities became suspicious after the conspirators kept returning to the restaurant to reintroduce their hack because it would not restart after the company computers shut down.

David McIntosh2008-05-01 00:00:00 UTC

May of 2008, one month after he resigned his position, he logged into government servers and deleted 10,475 user accounts belonging to employees for the the Health Department, hospital, prison, and Supreme Court.

Vlad Duiculescu 2008-04-15 00:00:00 UTC

Accused of illegally accessing email accounts of eBay users in 2005-2007.

Owen Walker2008-04-01 00:00:00 UTC

Accused of running a botnet under the name AKILL that infected more then 1.5Million hosts.

Dmitri Galushkevich2008-01-25 00:00:00 UTC

Using a botnet to take down the Web site of Prime Minister Andrus Ansips Reform Party.

Alan Ralsky2008-01-03 00:00:00 UTC

served as the chief executive officer and primary deal maker for the spam e-mail operation.