Top
Romanian Hackers Extradited to U.S. over $18M Vishing Scam | Threatpost – ANITH
fade
144711
post-template-default,single,single-post,postid-144711,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Romanian Hackers Extradited to U.S. over $18M Vishing Scam | Threatpost

Romanian Hackers Extradited to U.S. over $18M Vishing Scam | Threatpost


A pair of Romanian hackers have been extradited to the U.S. after allegedly bilking unwitting victims out of more than $18 million in an elaborate voice- and SMS-phishing (i.e., vishing/smishing) scheme.

Teodor Laurentiu Costea and Robert Codrut Dumitrescu were named in the 31-count federal grand jury indictment on August 16 last year; they were arraigned last week in the Northern District of Georgia following their extradition. Another co-defendant, Cosmin Draghici, is in custody in Romania awaiting his own extradition to the U.S. They face federal charges of wire fraud conspiracy, wire fraud, computer fraud and abuse, and aggravated identity theft.

“While in Romania, the defendants allegedly targeted victims throughout the U.S., including in the Northern District of Georgia, stealing personal information and possibly causing millions of dollars in losses,” said U. S. Attorney Byung J. “BJay” Pak. “These extraditions send a strong warning to cybercriminals and fraudsters worldwide, that we, along with our law-enforcement partners, will work tirelessly to bring you to justice.”

Pak said that from October 2011 until February 2014, Costea and Dumitrescu lived in Ploiesti, Romania but allegedly spent their time compromising vulnerable computers in the U.S. from which they mounted an automated vishing and smishing scam. The court documents allege that they installed interactive voice response software on victim computers in the Atlanta area to initiate thousands of automated telephone calls and text messages to victims across country. Those messages purported to be from a financial institution and directed victims to call a telephone number due to a supposed problem with their respective financial account.

When victims called the telephone number, they were prompted by the IVR software to enter their bank account numbers, PINs, and full or partial Social Security numbers. The stolen account numbers were stored on the compromised computers and then accessed by Costea and Dumitrescu, who then allegedly sold or used the fraudulently obtained information with the assistance of Draghici.

At the time of his arrest in Romania, Costea possessed 36,051 fraudulently obtained financial account numbers, the court documents alleged.

“Our message to the victims of cyber-fraud is that the FBI won’t let geographic boundaries stop us from pursuing and prosecuting the persons who cause them tremendous financial pain,” said David LeValley, special agent in charge of FBI Atlanta. “Our message to the perpetrators of these crimes is that cybercriminals cannot hide in the shadows of the internet. We will identify them and bring them to justice.”

!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,’script’,’//connect.facebook.net/en_US/fbevents.js’);
fbq(‘init’, ‘839281392784015’);
fbq(‘track’, ‘PageView’);



Source link

Anith Gopal
No Comments

Post a Comment