DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Queens, N.Y., Men Sentenced To 57 Months In Prison For Large-Scale Atm Skimming Scheme Targeting New Jersey Bank Customers

Posted on February 20, 2014 by Dissent

Two Romanian natives residing in Queens, N.Y., were sentenced today to prison terms for a scheme to steal account information from bank customers throughout New York, New Jersey, and Connecticut by installing secret card-reading devices on ATMs, U.S. Attorney Paul J. Fishman announced.

Ioan Leusca, a/k/a “Ionel Spinu,” 30, and Dezso Gyapias, a/k/a “Valentin Folea,” 29, were each sentenced to 57 months in prison.

The defendants previously pleaded guilty before U.S. District Judge William J. Martini to separate informations charging each with one count of conspiracy to commit bank fraud and one count of aggravated identity theft. Leusca and Gyapias have been held without bail since their arrests on Jan. 13, 2013. Judge Martini imposed the sentences today in Newark federal court.

According to documents filed in these and other cases and statements made in court:

Leusca and Gyapias admitted that they and their fellow conspirators installed skimmers and pinhole cameras at bank ATMs. The devices were installed on multiple ATMs in New Jersey and Connecticut. Each skimmer, an electronic device, would read and record identity and account information contained in the magnetic strip of a customer’s ATM card. The pinhole camera secretly recorded bank customers’ keystrokes as they entered their personal identification numbers. Leusca and Gyapias admitted that they and other conspirators went back to collect the devices containing the recorded information.

Leusca and Gyapias acknowledged that after the stolen customer account and identification information had been loaded onto blank ATM cards, they and their conspirators used those cards to steal $985,000 from Citibank ATMs in New Jersey, New York and Connecticut.

The charges leading to their sentences arose from a larger investigation into a skimming scheme that targeted customers in the tri-state area in 2012 and early 2013. Together, the schemes cost a number of banks a total of $5 million in cash stolen from their customer accounts.

Of the eight others charged in relation to the wider scheme, all Romanian nationals who lived in Queens, seven are in custody. The leaders of the scheme, Marius Vintila, 31, and Bogdan Radu, 31, were charged by criminal complaint on July 10, 2013. Vintila and Radu designed and created the actual skimming devices and pinhole cameras and recruited individuals, including Leusca and Gyapias, to install them on bank ATMs. Vintila used an alias to rent multiple self-storage units, in which he stored the contents of an entire skimming operation, including skimming devices, pinhole cameras, super glue, tape, SD cards, batteries, computers, molds, fraudulent ATM cards, and cash proceeds. Radu taught co-conspirators how to install the skimming devices, and used an alias to move skimming devices and cash proceeds overseas.

Other charged conspirators, including Constantin Ginga, 53, Marius Cotiga, 35, Constantin Pendus, 30, Emil Revesz, 30, Florin Apetrei, 18 and another individual charged as “first name unknown, last name unknown,” a/k/a “Chioru,” installed the devices designed by Vintila and Radu onto bank ATMs and used fraudulent ATM cards to steal millions of dollars. They used hats, jackets, scarves and sunglasses to disguise themselves while installing the devices and while using the cards to withdraw money.

Ginga, Cotiga, Leusca, Gyapias, Pendus, Revesz, Apetrei, and Radu are in custody in New Jersey and being held without bail. Ginga previously pleaded guilty to conspiring to commit bank fraud and aggravated identity theft and awaits sentencing on Feb. 26, 2014. On Sept. 24, 2013, Vintila was apprehended in Sweden and extradited to the United States in February 2014. Vintila was charged in a six-count indictment on Feb.18, 2014, with conspiracy to commit bank fraud, aggravated identity theft, conspiracy to possess 15 or more counterfeit access devices, possession of 15 or more counterfeit access devices, conspiracy to possess access device-making equipment, and possession of access device-making equipment. The individual known as “Chioru” remains at large.

In addition to the prison terms, Judge Martini sentenced Leusca and Gyapias to two years each of supervised release and to pay $985,000 in restitution.

U.S. Attorney Fishman praised special agents of the U.S. Secret Service, Newark Field Office, under the direction of Special Agent in Charge James Mottola, along with special agents of the U.S. Department of Homeland Security’s Immigration and Customs Enforcement, Homeland Security Investigations in Newark, under the direction of Special Agent in Charge Andrew M. McLees, with the investigation leading to today’s sentences.

The charges and allegations against the other defendants charged in the pending complaints are merely accusations, and the defendants are considered innocent unless and until proven guilty.

The government is represented by Assistant U.S. Attorneys Rahul Agarwal and David Eskew of the U.S. Attorney’s Office Criminal Division in Newark.

14-055

Defense counsel:

Leusca: Frank Arleo Esq., West Orange, N.J.
Gyapias: Joseph Rotella Esq., Newark

SOURCE: U.S. Attorney’s Office, District of New Jersey

Category: Financial SectorSkimmersU.S.

Post navigation

← Two Sigma Analyst Charged With Confidential Data Theft
UK: Police arrest two involved in Aviva data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.