DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New Hampshire man to be sentenced in international scheme using malware to generate calls to premium phone numbers

Posted on February 15, 2011 by Dissent

On February 28, 2011, Asu Pala, a 37 year-old New Hampshire man will be sentenced for his role in an international computer hacking conspiracy that earned him nearly $8 million. On April 21, 2010, Pala of Hudson, NH, pleaded guilty to one count of conspiracy to commit computer fraud and five counts of failure to file a United States income tax return.

Individuals who believe that they may be a victim of Pala’s scheme should notify the U.S. Attorney’s Office by filling out a victim impact statement form which can be found at at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf and e-mailing the form to [email protected].

During an earlier plea hearing, the prosecutor told the court that had Pala gone to trial, the government’s evidence would have proven that from 2003 through 2007, Pala and his co-conspirators infected German citizens’ computers with a program that would force the computers’ telephone modems to surreptitiously dial premium telephone numbers rented from German telephone companies by Pala’s co-conspirators. The premium telephone lines operated like 1-900 numbers such as those used for directory assistance or astrological predictions: the telephone companies charged callers for added expenses on top of standard connection fees and sent a portion of the added expenses to those who rented the premium lines, in this case Pala’s co-conspirators. The victims were generally unaware that their computers’ telephone modems were calling these numbers and charging them these expenses. Victims paid the added charges if they did not notice them on their telephone bills. The telephone companies then sent the added charges to the premium telephone line renters, who divided the proceeds among the co-conspirators, including Pala. Pala, the prosecutor stated, participated in the conspiracy by employing computer programmers to write and edit the computer hacking software and by sending the hacking software to co-conspirators.

Although Pala participated in the scheme while based in Massachusetts and elsewhere in New England, Pala did not target United States computers or computer users. Instead, Pala focused solely on computers and computer users in Germany and possibly other European countries. In the process, the prosecutor stated, from 2003 through 2007, Pala made approximately $7,941,336 from the computer hacking conspiracy. Pala also allegedly failed to pay approximately $2,287,993 in income taxes during this time, including taxes on his income from the hacking scheme.

Judge Gorton scheduled sentencing for February 28, 2011. Pala faces up to 10 years of imprisonment; 3 years of supervised release to follow; a fine of $250,000 or twice the gain or loss, whichever is highest, on each count; restitution to the computer hacking victims; restitution to the IRS of approximately $2,287,993; and forfeiture of up to $7,941,336. The United States Attorney has recommended a sentence that includes all the above elements, and imprisonment for 92 months.

Victims of Pala’s conspiracy, who connected to the Internet using telephone lines while located in Germany and possibly other European countries between late 2003 and 2007, may e-mail any information and documentation regarding victimization and/or loss to [email protected] by February 23, 2010.* Victim impact statement forms can be found at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf.

Victims of United States federal crimes are accorded various rights, which are listed in Title 18, United States Code, Section 3771. These rights include the right not to be excluded from most public court proceedings, the right to be reasonably heard at a public court proceeding, the right to confer with the government, and the right to be treated with fairness and respect for the victims’ dignity and privacy.

*Potential victims will not be contacted individually. Any persons determined to be a victim by the Court will be contacted through appropriate international law enforcement officials following the sentencing hearing. Sentencing results will be posted on http://www.justice.gov/usao/ma/press.html.

Source: U.S. Attorney’s Office, District of Massachusetts


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsMalwareNon-U.S.

Post navigation

← Hacker Blackmails Nintendo With Personal Data From 4,000 Gamers
WVa hospital breached – but we won't know who until Weds. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.