DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New Hampshire man to be sentenced in international scheme using malware to generate calls to premium phone numbers

Posted on February 15, 2011 by Dissent

On February 28, 2011, Asu Pala, a 37 year-old New Hampshire man will be sentenced for his role in an international computer hacking conspiracy that earned him nearly $8 million. On April 21, 2010, Pala of Hudson, NH, pleaded guilty to one count of conspiracy to commit computer fraud and five counts of failure to file a United States income tax return.

Individuals who believe that they may be a victim of Pala’s scheme should notify the U.S. Attorney’s Office by filling out a victim impact statement form which can be found at at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf and e-mailing the form to [email protected].

During an earlier plea hearing, the prosecutor told the court that had Pala gone to trial, the government’s evidence would have proven that from 2003 through 2007, Pala and his co-conspirators infected German citizens’ computers with a program that would force the computers’ telephone modems to surreptitiously dial premium telephone numbers rented from German telephone companies by Pala’s co-conspirators. The premium telephone lines operated like 1-900 numbers such as those used for directory assistance or astrological predictions: the telephone companies charged callers for added expenses on top of standard connection fees and sent a portion of the added expenses to those who rented the premium lines, in this case Pala’s co-conspirators. The victims were generally unaware that their computers’ telephone modems were calling these numbers and charging them these expenses. Victims paid the added charges if they did not notice them on their telephone bills. The telephone companies then sent the added charges to the premium telephone line renters, who divided the proceeds among the co-conspirators, including Pala. Pala, the prosecutor stated, participated in the conspiracy by employing computer programmers to write and edit the computer hacking software and by sending the hacking software to co-conspirators.

Although Pala participated in the scheme while based in Massachusetts and elsewhere in New England, Pala did not target United States computers or computer users. Instead, Pala focused solely on computers and computer users in Germany and possibly other European countries. In the process, the prosecutor stated, from 2003 through 2007, Pala made approximately $7,941,336 from the computer hacking conspiracy. Pala also allegedly failed to pay approximately $2,287,993 in income taxes during this time, including taxes on his income from the hacking scheme.

Judge Gorton scheduled sentencing for February 28, 2011. Pala faces up to 10 years of imprisonment; 3 years of supervised release to follow; a fine of $250,000 or twice the gain or loss, whichever is highest, on each count; restitution to the computer hacking victims; restitution to the IRS of approximately $2,287,993; and forfeiture of up to $7,941,336. The United States Attorney has recommended a sentence that includes all the above elements, and imprisonment for 92 months.

Victims of Pala’s conspiracy, who connected to the Internet using telephone lines while located in Germany and possibly other European countries between late 2003 and 2007, may e-mail any information and documentation regarding victimization and/or loss to [email protected] by February 23, 2010.* Victim impact statement forms can be found at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf.

Victims of United States federal crimes are accorded various rights, which are listed in Title 18, United States Code, Section 3771. These rights include the right not to be excluded from most public court proceedings, the right to be reasonably heard at a public court proceeding, the right to confer with the government, and the right to be treated with fairness and respect for the victims’ dignity and privacy.

*Potential victims will not be contacted individually. Any persons determined to be a victim by the Court will be contacted through appropriate international law enforcement officials following the sentencing hearing. Sentencing results will be posted on http://www.justice.gov/usao/ma/press.html.

Source: U.S. Attorney’s Office, District of Massachusetts

Category: Breach IncidentsMalwareNon-U.S.

Post navigation

← Hacker Blackmails Nintendo With Personal Data From 4,000 Gamers
WVa hospital breached – but we won't know who until Weds. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.