DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Missouri man pleads guilty to his role in computer hacking, ID theft scheme enabled by consumers’ re-use of login credentials

Posted on December 7, 2013 by Dissent

Tammy Dickinson, United States Attorney for the Western District of Missouri, announced that the fifth and final defendant pleaded guilty in federal court Thursday to his role in a $725,000 fraud scheme that involved hacking into business computer systems to steal the identity information of hundreds of their customers.

Vince Evola, 45, of Gladstone, Mo., pleaded guilty before U.S. Chief District Judge Fernando J. Gaitan to conspiracy to commit mail fraud.

By pleading guilty, Evola admitted that he participated in a computer hacking and identity theft scheme with his ex-wife, Kimberly Evola, 45, of Gladstone, his sisters, Carrie Evola, 46, of Gladstone and Rosemary Evola, 42, of Overland Park, Kan., and Sael Mustafa, 35, a citizen of Jordan who resided in Gladstone.

The three-year-long scheme, which began in 2006, was designed to obtain stolen credit and debit card numbers from hundreds of victims and use that information to make online purchases. Vince Evola acknowledged in the plea agreement that a loss between $30,000 and $70,000 can be attributed to his conduct.

All of Vince Evola’s co-defendants already have pleaded guilty and been sentenced. Mustafa, the leader of the scheme, was sentenced on July 8, 2011, to 10 years in federal prison without parole and ordered to pay restitution to his victims. Mustafa committed a substantial part of the fraud scheme outside the United States. Before moving to Gladstone, Mustafa used the wireless network at an Internet café in Jordan to hack into company Web sites, as well as to use the stolen identity information to access online credit card accounts and to conduct fraudulent transactions. He moved from Jordan to Gladstone in January 2009 and continued to operate the scheme until April 2009.

Court documents describe the computer hacking, identity theft and fraud scheme as follows:

Step One: The Computer Hack

Mustafa accessed the computer servers that hosted the Web sites of several businesses to access customer databases and download the customers’ personal information. Mustafa exploited these businesses for presumably less secure information, such as e-mail addresses, Web site passwords and security questions. This information was usually provided to the business by a customer registering on the Web site for online services such as a company newsletter, making a reservation, buying a gift card, or receiving e-mail coupons.

Step Two: Accessing Credit Card Accounts

Mustafa and his co-conspirators then tried to use this stolen customer information at major credit card Web sites. Mustafa counted on the likelihood that many identity theft victims used the same password for the hacked accounts that they used for their online credit card accounts. Mustafa visited various credit card Web sites and, by trial and error, tested the stolen identity information to see if it matched the login and password information for their credit card account. If a victim had an account at a particular credit card Web site, and if the victim used the same login and password information, Mustafa was able to access their accounts.

Step Three: Using the Victims’ Accounts

After gaining access to victims’ credit card accounts, conspirators purchased more than $240,000 worth of airline tickets (both domestic and international) and more than $30,000 in gift cards online. They also sent, or attempted to send, more than $344,000 in wire transfers and conducted more than $106,000 in other fraudulent online transactions (such as a subscription to the Al-Jazeera Channel). They purchased gift cards or made purchases online from businesses such as Hy-Vee, Nebraska Furniture Mart, AMC Theaters, Bass Pro Shop, Hallmark, Liz Claiborne, Lowes, Red Lobster, Olive Garden, PF Chang’s, and Zales, among others. They directed the products to be mailed to their residences.

Under federal statutes, Evola is subject to a sentence of up to 20 years in federal prison without parole, plus a fine up to $250,000. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

This case is being prosecuted by Assistant U.S. Attorney Matthew P. Wolesky. It was investigated by the U.S. Postal Inspection Service and the Gladstone, Mo., Police Department.

SOURCE: U.S. Attorney’s Office, Western District of Missouri


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • How a hacking gang held Italy’s political elites to ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
Category: Business SectorHackID Theft

Post navigation

← JPMorgan Chase & Co. explains delay in notifying Connecticut about online security breach
UK: PSNI to pay £20k in damages to Special Branch officer whose details were stolen in Castlereagh police station raid →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.