DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Florida Man Admits Leading Stolen Credit Card Trafficking Ring Involving More Than 114,000 Accounts And Losses Of $23 Million

Posted on August 9, 2014 by Dissent

A Florida man pleaded guilty to his role in a conspiracy to possess and traffic stolen credit card data held by New Jersey residents, U.S. Attorney Paul J. Fishman announced.

Miguel Gonzalez, 40, of Miami, Florida, pleaded guilty before U.S. District Court Judge Esther Salas in Newark federal court to an information charging him with one count of conspiracy to commit wire fraud.

According to documents filed in this case and statements made in court:

Between January 2010 and July 2013, Gonzalez obtained and possessed stolen credit card data for more than 114,000 credit card accounts. Gonzalez purchased the stolen credit card information from various vendors who advertise and transmit the data over the Internet using email and instant chat software. These vendors sold stolen credit card data obtained from network intrusions into various corporate victims, including major retailers in the state of New Jersey. The stolen credit card data was used by Gonzalez and others to create counterfeit credit cards, which were used to enter into unauthorized and fraudulent transactions. The credit card issuers associated with the more than 114,000 stolen credit card accounts suffered a combined loss of more than $23 million. Gonzalez used the proceeds of his illegal activity to purchase multiple homes, expensive jewelry and a speedboat.

The conspiracy to commit wire fraud charge carries a maximum potential penalty of 30 years in prison and a $1 million fine. Sentencing is scheduled for Nov. 21, 2014.

U.S. Attorney Fishman credited agents of the U.S. Secret Service, under the direction of Special Agent in Charge James Mottola, with the investigation leading to today’s guilty plea.

The government is represented by Assistant U.S. Attorney Andrew S. Pak of the Computer Hacking and Intellectual Property Section of the Office’s Economic Crimes Unit.

Defense counsel: Ricardo P. Hermida Esq., Miami
Gonzalez, Miguel Information

SOURCE: U.S. Attorney’s Office, District of New Jersey


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Business SectorID TheftU.S.

Post navigation

← Protecting privacy while gathering health data
Report slams medical privacy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.