DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Queens, N.Y., Men Sentenced To 57 Months In Prison For Large-Scale Atm Skimming Scheme Targeting New Jersey Bank Customers

Posted on February 20, 2014 by Dissent

Two Romanian natives residing in Queens, N.Y., were sentenced today to prison terms for a scheme to steal account information from bank customers throughout New York, New Jersey, and Connecticut by installing secret card-reading devices on ATMs, U.S. Attorney Paul J. Fishman announced.

Ioan Leusca, a/k/a “Ionel Spinu,” 30, and Dezso Gyapias, a/k/a “Valentin Folea,” 29, were each sentenced to 57 months in prison.

The defendants previously pleaded guilty before U.S. District Judge William J. Martini to separate informations charging each with one count of conspiracy to commit bank fraud and one count of aggravated identity theft. Leusca and Gyapias have been held without bail since their arrests on Jan. 13, 2013. Judge Martini imposed the sentences today in Newark federal court.

According to documents filed in these and other cases and statements made in court:

Leusca and Gyapias admitted that they and their fellow conspirators installed skimmers and pinhole cameras at bank ATMs. The devices were installed on multiple ATMs in New Jersey and Connecticut. Each skimmer, an electronic device, would read and record identity and account information contained in the magnetic strip of a customer’s ATM card. The pinhole camera secretly recorded bank customers’ keystrokes as they entered their personal identification numbers. Leusca and Gyapias admitted that they and other conspirators went back to collect the devices containing the recorded information.

Leusca and Gyapias acknowledged that after the stolen customer account and identification information had been loaded onto blank ATM cards, they and their conspirators used those cards to steal $985,000 from Citibank ATMs in New Jersey, New York and Connecticut.

The charges leading to their sentences arose from a larger investigation into a skimming scheme that targeted customers in the tri-state area in 2012 and early 2013. Together, the schemes cost a number of banks a total of $5 million in cash stolen from their customer accounts.

Of the eight others charged in relation to the wider scheme, all Romanian nationals who lived in Queens, seven are in custody. The leaders of the scheme, Marius Vintila, 31, and Bogdan Radu, 31, were charged by criminal complaint on July 10, 2013. Vintila and Radu designed and created the actual skimming devices and pinhole cameras and recruited individuals, including Leusca and Gyapias, to install them on bank ATMs. Vintila used an alias to rent multiple self-storage units, in which he stored the contents of an entire skimming operation, including skimming devices, pinhole cameras, super glue, tape, SD cards, batteries, computers, molds, fraudulent ATM cards, and cash proceeds. Radu taught co-conspirators how to install the skimming devices, and used an alias to move skimming devices and cash proceeds overseas.

Other charged conspirators, including Constantin Ginga, 53, Marius Cotiga, 35, Constantin Pendus, 30, Emil Revesz, 30, Florin Apetrei, 18 and another individual charged as “first name unknown, last name unknown,” a/k/a “Chioru,” installed the devices designed by Vintila and Radu onto bank ATMs and used fraudulent ATM cards to steal millions of dollars. They used hats, jackets, scarves and sunglasses to disguise themselves while installing the devices and while using the cards to withdraw money.

Ginga, Cotiga, Leusca, Gyapias, Pendus, Revesz, Apetrei, and Radu are in custody in New Jersey and being held without bail. Ginga previously pleaded guilty to conspiring to commit bank fraud and aggravated identity theft and awaits sentencing on Feb. 26, 2014. On Sept. 24, 2013, Vintila was apprehended in Sweden and extradited to the United States in February 2014. Vintila was charged in a six-count indictment on Feb.18, 2014, with conspiracy to commit bank fraud, aggravated identity theft, conspiracy to possess 15 or more counterfeit access devices, possession of 15 or more counterfeit access devices, conspiracy to possess access device-making equipment, and possession of access device-making equipment. The individual known as “Chioru” remains at large.

In addition to the prison terms, Judge Martini sentenced Leusca and Gyapias to two years each of supervised release and to pay $985,000 in restitution.

U.S. Attorney Fishman praised special agents of the U.S. Secret Service, Newark Field Office, under the direction of Special Agent in Charge James Mottola, along with special agents of the U.S. Department of Homeland Security’s Immigration and Customs Enforcement, Homeland Security Investigations in Newark, under the direction of Special Agent in Charge Andrew M. McLees, with the investigation leading to today’s sentences.

The charges and allegations against the other defendants charged in the pending complaints are merely accusations, and the defendants are considered innocent unless and until proven guilty.

The government is represented by Assistant U.S. Attorneys Rahul Agarwal and David Eskew of the U.S. Attorney’s Office Criminal Division in Newark.

14-055

Defense counsel:

Leusca: Frank Arleo Esq., West Orange, N.J.
Gyapias: Joseph Rotella Esq., Newark

SOURCE: U.S. Attorney’s Office, District of New Jersey

Category: Financial SectorSkimmersU.S.

Post navigation

← Two Sigma Analyst Charged With Confidential Data Theft
UK: Police arrest two involved in Aviva data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.