Oct 2, 2014
Sep 25, 2014
Sep 18, 2014
Sep 4, 2014
Romanian national sentenced in credit-card hacking scheme
CONCORD - A Romanian national was sentenced Monday to 21 months in prison for his role in an international, multimillion-dollar hacking scheme to steal payment card data from hundreds of merchants' computers across the United States.
Cezar Butu, 27, of Ploiesti, Romania, was sentenced by Judge Steven J. McAuliffe in U.S. District Court for the District of New Hampshire. He pleaded guilty on Sept. 17 to one count of conspiracy to commit access device fraud.
Butu admitted that from 2009 to 2011 he took part in a Romanian-based conspiracy to hack into hundreds of U.S.-based computers to steal credit, debit and payment account numbers and payment card data that belongs to American cardholders.
According to court documents, Butu and his co-conspirators hacked into more than 150 Subway restaurant computers across the U.S., including one in Plaistow, as well as more than 50 other retail merchants. The conspirators compromised credit cards of more than 80,000 customers and racked up millions of dollars in unauthorized purchases.
The conspirators stole payment card information to make unauthorized charges on, and/or transfers of funds from cardholders' accounts (or alternatively to transfer the stolen payment card data to other co-conspirators who would do the same). Court records indicate the conspiracy began as early as April 2008 and continued to at least March 1, 2011.
The group remotely scanned the Internet to identify vulnerable point of service systems with remote desktop software applications (RDAs) installed on them. The conspirators then remotely logged onto the targeted systems either by guessing the passwords or using password-cracking software programs.
Prosecutors said in court documents the conspirators then remotely and surreptitiously installed software programs called "keystroke loggers" or "sniffers" onto the POS systems, which would record and store data keyed into or swiped through the merchants' POS systems, including customers' credit card data.
Members often installed a "back door Trojan" into the POS systems so they could later install or re-install additional software programs - "hacker tools" - designed to evade detection.
Once they had the credit and debit card information, prosecutors said the group uploaded the information to several computer servers they set up to store the data known as "dump sites." Some of those sites were labeled "ftp.tushtime.info," "ftp.cindarella.info," and "ftp.just(expletive deleted)it.info."
The group also allegedly created phony plastic credit cards using hardware and software devices, including magnetic strip readers/writers, to encode blank plastic cards with the stolen credit card information. Those fake credit cards were mainly used for purchases in Europe.
Butu admitted he repeatedly asked an alleged co-conspirator to provide him with stolen payment card data, and the alleged co-conspirator provided him with instructions for how to access a website where a portion of the stolen payment card data was stored. Butu later attempted to use a stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts.
According to Butu's plea agreement, he also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. Butu admitted to acquiring stolen payment card data belonging to about 140 cardholders during the course of the scheme.
Co-conspirator Iulian Dolan pleaded guilty to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud. His plea agreement calls for him to serve seven years in prison. His sentencing is set for April 4.
A third man, Adrian-Tiberiu Oprea, is scheduled for trial on Feb. 20.
The case was investigated by the U.S. Secret Service, with assistance from New Hampshire State Police and the Romanian Directorate of Investigation of Organized Crime and Terrorism.
Trial attorney Mona Sedky in the Criminal Division's Computer Crime and Intellectual Property Section in Washington, D.C., and assistant U.S. Attorney Arnold H. Huftalen in Concord are prosecuting the cases.
READER COMMENTS: 1
- Fight leads to stabbing in Plymouth - 0
- College president, Gov. Hassan promise to punish those involved in Keene riots - 6
- Somersworth plaza evacuated after phoned threat to blow up NH State Liquor Store - 0
- Londonderry man killed in cycle crash - 0
- Rowdy night ushers in Keene Pumpkin Festival - 0
- Police seek two men in Concord home invasion - 0
- No arrests in Manchester SWAT incident - 0
- Man wanted in Fremont homicide investigation found dead - 0
- Free Keene founder gets community service sentence for fraud conviction - 1
READER COMMENTS: 0
- UNH women's hockey coach hired to restore winning ways - 0
- Flash mob workshop will be a 'Thriller' - 0
- Former Royals slugger and current Giants scout Balboni's heart remains with San Francisco - 0
- Sam Asano's Let's Invent: The pesky problem of financing inventions - 0
- Your Turn, NH -- Kelley Tambouris: I am a Manchester teacher, and I need more support - 0
- What rising tide? Kuster vs. Kennedy - 3
- Government thinks it's your right not to know - 0
- On Obamacare: Shaheen doesn't get it - 4
- Two nonprofits receive a 'quick' $25,000 after pitch - 0
Keene Pumpkin Festival has uncertain future
Keene State College students clean up after mayhem, say weekend riots were not their fault
Monitoring social media
Shaheen, in Hooksett, rallies with union
After riots, soul-searching begins
On Obamacare: Shaheen doesn't get it
What rising tide? Kuster vs. Kennedy