Oct 2, 2014
Sep 25, 2014
Sep 18, 2014
Sep 4, 2014
Romanian national sentenced in credit-card hacking scheme
CONCORD - A Romanian national was sentenced Monday to 21 months in prison for his role in an international, multimillion-dollar hacking scheme to steal payment card data from hundreds of merchants' computers across the United States.
Cezar Butu, 27, of Ploiesti, Romania, was sentenced by Judge Steven J. McAuliffe in U.S. District Court for the District of New Hampshire. He pleaded guilty on Sept. 17 to one count of conspiracy to commit access device fraud.
Butu admitted that from 2009 to 2011 he took part in a Romanian-based conspiracy to hack into hundreds of U.S.-based computers to steal credit, debit and payment account numbers and payment card data that belongs to American cardholders.
According to court documents, Butu and his co-conspirators hacked into more than 150 Subway restaurant computers across the U.S., including one in Plaistow, as well as more than 50 other retail merchants. The conspirators compromised credit cards of more than 80,000 customers and racked up millions of dollars in unauthorized purchases.
The conspirators stole payment card information to make unauthorized charges on, and/or transfers of funds from cardholders' accounts (or alternatively to transfer the stolen payment card data to other co-conspirators who would do the same). Court records indicate the conspiracy began as early as April 2008 and continued to at least March 1, 2011.
The group remotely scanned the Internet to identify vulnerable point of service systems with remote desktop software applications (RDAs) installed on them. The conspirators then remotely logged onto the targeted systems either by guessing the passwords or using password-cracking software programs.
Prosecutors said in court documents the conspirators then remotely and surreptitiously installed software programs called "keystroke loggers" or "sniffers" onto the POS systems, which would record and store data keyed into or swiped through the merchants' POS systems, including customers' credit card data.
Members often installed a "back door Trojan" into the POS systems so they could later install or re-install additional software programs - "hacker tools" - designed to evade detection.
Once they had the credit and debit card information, prosecutors said the group uploaded the information to several computer servers they set up to store the data known as "dump sites." Some of those sites were labeled "ftp.tushtime.info," "ftp.cindarella.info," and "ftp.just(expletive deleted)it.info."
The group also allegedly created phony plastic credit cards using hardware and software devices, including magnetic strip readers/writers, to encode blank plastic cards with the stolen credit card information. Those fake credit cards were mainly used for purchases in Europe.
Butu admitted he repeatedly asked an alleged co-conspirator to provide him with stolen payment card data, and the alleged co-conspirator provided him with instructions for how to access a website where a portion of the stolen payment card data was stored. Butu later attempted to use a stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts.
According to Butu's plea agreement, he also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. Butu admitted to acquiring stolen payment card data belonging to about 140 cardholders during the course of the scheme.
Co-conspirator Iulian Dolan pleaded guilty to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud. His plea agreement calls for him to serve seven years in prison. His sentencing is set for April 4.
A third man, Adrian-Tiberiu Oprea, is scheduled for trial on Feb. 20.
The case was investigated by the U.S. Secret Service, with assistance from New Hampshire State Police and the Romanian Directorate of Investigation of Organized Crime and Terrorism.
Trial attorney Mona Sedky in the Criminal Division's Computer Crime and Intellectual Property Section in Washington, D.C., and assistant U.S. Attorney Arnold H. Huftalen in Concord are prosecuting the cases.
READER COMMENTS: 9
- Thieves target cars in Hollis neighborhood - 1
- Judge lifts no-contact order - 0
- Suspected rioter faces felony charge in Keene - 3
- Hudson man charged with impersonating police officer - 1
- Fashion-conscience robber hits Rochester bank - 0
- Report: Student opens fire at Washington state high school; gunman reported dead - 3
- Accident results in DWI charge for Hudson man - 0
- Blackwater verdict stuns NH dad - 16
- No murder charge in fatal stabbing of city man - 2
READER COMMENTS: 0
- NHIAA: Lancers beat South - 0
- College Football: St. Anselm football loses third straight game - 0
- John Habib's City Sports: Tough decisions loom for Legion - 0
- A good first impression - 0
- NHIAA: Exeter keeps Memorial attack at bay - 0
- Windham clinches first with huge win - 0
- NHIAA: Campbell thumps Brady - 0
- NHIAA: Brummett scores 5 for Derryfield - 0
- NHIAA: Souhegan advances in OT - 0
Blackwater verdict stuns NH dad
Hassan, Havenstein spar over education
A good first impression
Thieves target cars in Hollis neighborhood
- Whom do you think bears the brunt of the blame for the mayhem this weekend in Keene?
- KSC students
- KSC administration
- Visitors from out of town
- A combination of any/all of the above
- Total Votes: 2483