DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Four Romanian nationals indicted for hacking Subway and 50 other merchants’ POS systems

Posted on December 8, 2011 by Dissent

The U.S. Dept. of Justice has issued a press release about an indictment that may relate to some breaches involving Subway Restaurant previously reported on this blog. The case was filed May 4, but the indictment has just been unsealed.

Four Romanian nationals have been charged in federal court for their alleged participation in an international multimillion dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ point of sale (POS) computer systems.

Adrian-Tiberiu Oprea, 27, of Constanta, Romania; Iulian Dolan, 27, of Craiova, Romania; Cezar Iulian Butu, 26, of Ploiesti, Romania; and Florin Radu, 23, of Rimnicu Vilcea, Romania, were charged in a four-count indictment filed in the District of New Hampshire with conspiracy to commit computer fraud, wire fraud and access device fraud. Oprea was arrested last week in Romania and is currently in custody there. Dolan and Butu were arrested upon their entry into the United States on Aug. 13 and Aug. 14, 2011, respectively, and remain in United States custody. Radu remains at large.

According to the indictment, from approximately 2008 until May 2011, Oprea, Dolan, Butu and Radu conspired to remotely hack into more than 200 U.S.-based merchants’ POS systems in order to steal customers’ credit, debit and gift card numbers and associated data. The indictment alleges that as part of the conspiracy, the members remotely scanned the internet to identify vulnerable POS systems with certain remote desktop software applications (RDAs) installed on them, and using these RDAs, the conspirators logged onto the targeted POS systems over the internet, either by guessing the passwords or using password-cracking software programs. The failure of a number of installers and users to change the default login credentials on such RDAs has been a factor in other cases reported on this blog in the past and Visa has repeatedly advised merchants to disable RDAs unless absolutely necessary. In this case, the members also allegedly installed keyloggers and a backdoor to allow them further access to the systems over time. Prosecutors allege that the conspirators repeatedly “downloaded a hacker tool that is designed to evade detection, “xp.exe,” from the “kitsite.info” “dump site” onto victims’ POS terminals.” Data were stored on domestic and non-U.S. servers including ftp.shopings.info, ftp.justfuckit.info, ftp.cindarella.info, ftp.kitsite.info, ftp.tushtime.info, ftp.canadasite.info, and sendspace.com. The  dump sites  also included compromised internet-connected computers belonging to unsuspecting small business owners or individuals, including a computer server owned by a small business in Pennsylvania. Many of the dump sites were registered with GoDaddy.com.

Merchant victims include more than 150 Subway restaurant franchises (which is less than 1 percent of all Subway restaurants), located throughout the United States, including in the District of New Hampshire, as well as more than 50 other identified retailers. According to the indictment, members of the conspiracy have compromised the credit card data of more than 80,000 customers, and millions of dollars of unauthorized purchases have been made using the compromised data. The other merchants were not named in the indictment.

If convicted, the defendants face a maximum of five years in prison for each count of conspiracy to commit computer related fraud, 30 years in prison for each count of conspiracy to commit wire fraud and five years in prison for each count of conspiracy to commit access device fraud. They also face fines up to twice the amount of the fraud loss and restitution.

Although it didn’t garner much media coverage, this blog had reported incidents involving  card fraud at Subway locations in California and New York in 2009 and May 2010. Without knowing the identities of the other merchants, it’s unclear whether we knew about any of their breaches at the time or whether they ever notified affected customers.

Image credit: Saniphoto | Dreamstime


Related:

  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
Category: Breach IncidentsBusiness SectorHackID TheftOf NoteU.S.

Post navigation

← David Cecil, pleads guilty to 2 of 48 charges, faces 10years jail
Hershey Medical Center employee fired after breach of Joe Paterno's records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.