Police bust 55 in US cyber fraud, ID theft ring

By

Bank insiders helped bypass anti-fraud technologies.

Fifty-five individuals were charged with stealing millions of dollars from multiple financial institutions as part of a massive cyber fraud scheme.

Police bust 55 in US cyber fraud, ID theft ring

The defendants are accused of stealing more than $2 million from US institutions Chase, TD Bank, Citibank, Discover and American Express.

As part of their scheme, the crime ring also stole the identities of at least 200 individuals and organisations.

The charges include conspiracy to commit grand larceny, grand larceny, criminal possession of stolen property, identity theft and criminal possession of a forged instrument.

Between May 2010 and September this year, the perpetrators allegedly relied on rogue insiders at banks and other businesses to steal the personal information, including Social Security numbers and financial account information, belonging to unsuspecting customers, prosecutors said.

Members of the conspiracy recruited employees from the nonprofit United Jewish Appeal-Federation, car dealership Open Road Audi of Brooklyn, residential property management company AKAM Associates and Chase Bank.

In particular, the hired hands at Chase accessed banking customers' accounts and helped conduct fraudulent transactions by ensuring they were not immediately detected by the bank's anti-fraud and anti-money laundering systems.

“Today's indictment reveals another tool of organised identity thieves – insiders who betray their employers and prey on clients,” Vance said.

“These insiders used their positions to gain access to client data, and then sold that data to make money for themselves and their accomplices.”

Those in the fraud ring had numerous jobs, including buyers who purchased the stolen information from rogue insiders and resold some of it to other criminals.

Others ordered credit reports of victims to learn more about them so they could answer security questions to open additional credit card accounts in their names.

Still others used the stolen data to create counterfeit checks, while some were tasked with depositing the checks into their bank accounts.

The indictments and arrests were the result of an 18-month investigation that included court-ordered eavesdropping, physical surveillance, computer forensics and analysis of credit card, banking and phone records.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Macquarie's banking CISO headed to Endeavour Group

Macquarie's banking CISO headed to Endeavour Group

UniSuper's Google Cloud environment was deleted

UniSuper's Google Cloud environment was deleted

The full list of IT projects in the 2024-25 federal budget

The full list of IT projects in the 2024-25 federal budget

ASX's technology and data business chief to leave

ASX's technology and data business chief to leave

Log In

  |  Forgot your password?