DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New Hampshire man to be sentenced in international scheme using malware to generate calls to premium phone numbers

Posted on February 15, 2011 by Dissent

On February 28, 2011, Asu Pala, a 37 year-old New Hampshire man will be sentenced for his role in an international computer hacking conspiracy that earned him nearly $8 million. On April 21, 2010, Pala of Hudson, NH, pleaded guilty to one count of conspiracy to commit computer fraud and five counts of failure to file a United States income tax return.

Individuals who believe that they may be a victim of Pala’s scheme should notify the U.S. Attorney’s Office by filling out a victim impact statement form which can be found at at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf and e-mailing the form to [email protected].

During an earlier plea hearing, the prosecutor told the court that had Pala gone to trial, the government’s evidence would have proven that from 2003 through 2007, Pala and his co-conspirators infected German citizens’ computers with a program that would force the computers’ telephone modems to surreptitiously dial premium telephone numbers rented from German telephone companies by Pala’s co-conspirators. The premium telephone lines operated like 1-900 numbers such as those used for directory assistance or astrological predictions: the telephone companies charged callers for added expenses on top of standard connection fees and sent a portion of the added expenses to those who rented the premium lines, in this case Pala’s co-conspirators. The victims were generally unaware that their computers’ telephone modems were calling these numbers and charging them these expenses. Victims paid the added charges if they did not notice them on their telephone bills. The telephone companies then sent the added charges to the premium telephone line renters, who divided the proceeds among the co-conspirators, including Pala. Pala, the prosecutor stated, participated in the conspiracy by employing computer programmers to write and edit the computer hacking software and by sending the hacking software to co-conspirators.

Although Pala participated in the scheme while based in Massachusetts and elsewhere in New England, Pala did not target United States computers or computer users. Instead, Pala focused solely on computers and computer users in Germany and possibly other European countries. In the process, the prosecutor stated, from 2003 through 2007, Pala made approximately $7,941,336 from the computer hacking conspiracy. Pala also allegedly failed to pay approximately $2,287,993 in income taxes during this time, including taxes on his income from the hacking scheme.

Judge Gorton scheduled sentencing for February 28, 2011. Pala faces up to 10 years of imprisonment; 3 years of supervised release to follow; a fine of $250,000 or twice the gain or loss, whichever is highest, on each count; restitution to the computer hacking victims; restitution to the IRS of approximately $2,287,993; and forfeiture of up to $7,941,336. The United States Attorney has recommended a sentence that includes all the above elements, and imprisonment for 92 months.

Victims of Pala’s conspiracy, who connected to the Internet using telephone lines while located in Germany and possibly other European countries between late 2003 and 2007, may e-mail any information and documentation regarding victimization and/or loss to [email protected] by February 23, 2010.* Victim impact statement forms can be found at http://www.justice.gov/usao/ma/forms/PalaVictimNotification.pdf.

Victims of United States federal crimes are accorded various rights, which are listed in Title 18, United States Code, Section 3771. These rights include the right not to be excluded from most public court proceedings, the right to be reasonably heard at a public court proceeding, the right to confer with the government, and the right to be treated with fairness and respect for the victims’ dignity and privacy.

*Potential victims will not be contacted individually. Any persons determined to be a victim by the Court will be contacted through appropriate international law enforcement officials following the sentencing hearing. Sentencing results will be posted on http://www.justice.gov/usao/ma/press.html.

Source: U.S. Attorney’s Office, District of Massachusetts

Category: Breach IncidentsMalwareNon-U.S.

Post navigation

← Hacker Blackmails Nintendo With Personal Data From 4,000 Gamers
WVa hospital breached – but we won't know who until Weds. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.