DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Feds Bust Tijuana-Based Identity Theft Ring

Posted on March 7, 2014 by Dissent

I seem to have missed this February 28 press release from the U.S.A.O., Southern District of California:

Two men are charged in indictments unsealed this week with hacking into the computer servers of a major U.S. mortgage broker to steal personal information and use it to siphon funds from the brokerage accounts of thousands of victims.

Jason Ray Bailey and Victor Alejandro Fernandez were charged in a two-count indictment with conspiracy to commit wire fraud and computer hacking. Bailey was arraigned today before U.S. Magistrate Judge Jan Adler; Fernandez was arraigned on Wednesday.

According to charging documents, both men are part of a Tijuana-based conspiracy that hacked the computer servers of a U.S mortgage broker and obtained mortgage applications containing customers’ personal identification information such as names, dates of birth, Social Security numbers, addresses, assets, tax information, and driver’s licenses.

Approximately 4,200 customers had their information stolen between December 2012 and June 2013, and the conspiracy dates back to July 2011, the charging documents say.

[…]

Read more here.

Kristina Davis reports the follow-up:

A Chula Vista man charged in a Tijuana-based conspiracy to hack into a national mortgage company’s server and steal the identities of thousands of clients was granted bond in San Diego federal court Thursday, while his co-defendant has been ordered to remain behind bars.

Victor Alejandro Fernandez, 38, of Chula Vista may be released on $100,000 bond to be secured by property owned by family. If released, he must stay under house arrest, be monitored by GPS and not access the Internet.

The other defendant, Jason Ray Bailey, 38, of Mammoth Lakes didn’t challenge his detention during a hearing earlier in the week.

[…]

The hackers illegally accessed BlitzDoc, a program that the mortgage company used to store personal information on its customers, including names, social security numbers, addresses, tax information and driver’s licenses, according to the indictment.

The company is not named in the federal court papers, although its computer servers are based in Michigan.

Read more on U-T San Diego


Related:

  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • Two Defendants Plead Guilty To Fraud Scheme Involving Data Stolen From Hospital Patients
  • 39-year-old Nigerian extradited to US from France over alleged hacking
Category: ID Theft

Post navigation

← NY: Audit of Frontier Central School District finds inadequate security and policies for mobile devices
WA: Skagit County Government Settles Potential HIPAA Violations →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.