DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Kavaklov sentenced for major ATM skimming operation

Posted on September 11, 2009 by Dissent

Yordan Kavaklov, 29, of Bulgaria, was sentenced yesterday by Senior United States District Judge Willis B. Hunt, Jr. to serve over 4 years in federal prison on multiple felony charges for conspiring to steal the bank debit card numbers and passwords of over 200 individuals through the use of a skimming device the defendant connected to ATM’s in the metro Atlanta area.

Acting United States Attorney Sally Quillian Yates said, “This defendant used an ATM skimming device in the metro Atlanta area to steal the bank card numbers and passwords from over 200 unsuspecting individuals. At the time of arrest, he and his codefendant had 80 gift cards in their possession that had been altered to include customer account information and were using them as fake ATM cards to drain the customers’ accounts. The sentence handed down today provides a measure of justice to the victims whose savings and peace of mind were affected by the defendants’ illegal scheme.”

Jeffrey Gilbert, Special Agent in Charge of the United States Secret Service in Atlanta said, “The Secret Service has established a long history of protecting the American consumer and private industry from both national and transnational financial fraud. This investigation illustrates not just the significance of an aggressive and innovative investigative approach to investigations, but also illustrates the importance of task force partnerships with state and local law enforcement agencies in combating threats to our financial payment systems.”

Kavaklov was sentenced to 4 years, 6 months in prison to be followed by 3 years of supervised release, and ordered to pay restitution in the amount of $64,876.

Kavaklov was convicted of these charges on July 2, 2009 after pleading guilty to conspiracy, access device fraud, and aggravated identity theft. Kavaklov’s codefendant, Nikolay Nikolov, 23, of Bulgaria, also pleaded guilty and is scheduled to be sentenced by Judge Hunt on September 30, 2009.

According to Acting United States Attorney Yates, the charges and other information presented in court:

During the fall of 2008, Kavaklov and Nikolov used an illegal skimming device to steal tens of thousands of dollars from bank customers by connecting the device to Bank of America automated teller machines (ATM’s) in the metro Atlanta area and elsewhere. When a customer used the ATM with the skimming device installed, the device would electronically record the customer’s debit card number and a small camera in the device would video record the ATM keyboard as the customer entered his or her password.

Kavaklov and Nikolov then downloaded the information from the device to a computer and sent it by email to foreign email accounts located in Russia and Bulgaria. The defendants received an email in return attaching a list of bank debit card numbers and passwords. The defendants received account information back for individuals who lived in states, such as Texas and New Mexico, where the defendants had not used the skimming device. The defendants uploaded the account information they received by email onto the magnetic stripes of inactivated gift cards they had stolen from Bass Pro Shops, Cabela’s, and Sears. They then used the altered cards at metro Atlanta ATM’s to withdraw money from the accounts of customers whose debit card numbers and passwords had been obtained from the fraudulent skimming operation.

On November 6, 2008, Cobb County police officers arrested the defendants at a Bank of America ATM on Windy Hill Road in Marietta after two citizens reported suspicious behavior, including that the defendants were using multiple cards to withdraw money from both the walk-up and drive-in ATM’s. At the time of their arrest, the defendants were in possession of 80 stolen gift cards with altered magnetic stripes and passwords written on the face of the cards. An initial search of the defendants, their car, and hotel room uncovered the cards and over $30,000 in cash, the vast majority in $20 bills. A later search uncovered another $27,000 in cash, all in $20 bills, located in a plastic bag stored inside the door panel of the defendants’ Jaguar. Cobb County law enforcement investigators also seized the skimming device, a magnetic stripe card reader/writer, computers, and other equipment used in the conspiracy following the defendants’ arrest. A forensic analysis of the seized items revealed that the defendants had the account information for over 200 customers in the computers and gift cards.

This case was investigated by Special Agents of the United States Secret Service, investigators of the Cobb County Sheriff’s Office, and officers with the Cobb County Police Department. Assistant United States Attorney Stephen H. McClain prosecuted the case.

Source: U.S. Attorney’s Office

Category: Breach IncidentsBreach TypesFinancial SectorID TheftSkimmersU.S.

Post navigation

← Hackers breach Warrick Co. bank accounts
Four Springfield residents indicted for identity theft, counterfeit check conspiracy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.