DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Romanian National Extradited To New Jersey To Face Charges In Computer Hacking Scheme

Posted on March 23, 2015 by Dissent

A Romanian citizen made his initial court appearance today following his extradition to face charges that he orchestrated an international hacking scheme targeting retailers, security companies, medical offices and individuals in the United States, U.S. Attorney Paul J. Fishman announced.

Mircea-Ilie Ispasoiu, 29, of Drobeta-Turnu Severin, Romania, is charged by federal indictment with two counts of wire fraud, two counts of unauthorized computer access to obtain information, two counts of unauthorized computer access that caused damage and three counts of aggravated identity theft. Ispasoiu was arrested Nov. 13, 2014, following an investigation led by the U.S. Secret Service and coordinated with Romanian law enforcement. The Court of Appeal of Bucharest granted extradition on Jan. 26, 2015, and Ispasoiu arrived in the United States on March 20, 2015. He appeared this afternoon before U.S. Magistrate Judge Michael A. Hammer in Newark federal court.

According to documents filed in this case and statements made in court:

From August 2011 through February 2014, Ispasoiu was employed as computer systems administrator at a large financial institution in Romania. Ispasoiu’s scheme allegedly involved hacking networks belonging to retailers, security companies, medical offices and individuals in order to steal user names and passwords, personal identifiers and credit and debit card data. For just one of the victims identified in the indictment, Ispasoiu was able to steal more than 10,000 credit and debit card numbers. Ispasoiu also gained access to a computer at a large security company that ran background checks on job applicants. Ispasoiu stole the applicants’ personal identifying information, including their fingerprints.

The maximum potential penalties for each count are as follows:

Count Violation Maximum Penalty
1 and 2 Wire fraud 30 years; $1 million fine or twice the gain or loss from the offense
3 and 4 Unauthorized computer access to obtain information Five years; $250,000 fine or twice the gain or loss from the offense
5 and 6 Unauthorized computer access that caused damage Five years; $250,000 fine or twice the gain or loss from the offense
7-11 Aggravated identity theft Mandatory two years (consecutive to any other imposed sentence); $250,000 fine or twice the gain or loss from the offense

U.S. Attorney Fishman credited the special agents of the U.S. Secret Service, Newark Field Office, under the direction of Acting Special Agent in Charge Carl Agnelli, with the investigation leading to the charges. U.S. Attorney Fishman also thanked the Justice Department’s Office of International Affairs in Washington, as well as the Prosecutor’s Office attached to the High Court of Cassation and Justice in Romania and its law enforcement partners, for their support.

The government is represented by Assistant U.S. Attorney Daniel Shapiro of the Computer Hacking and Intellectual Property Section of the Office’s Economic Crimes Unit.

The charges and allegations contained in the indictment are merely accusations, and the defendant is considered innocent unless and until proven guilty.

15-097

Defense counsel: Kevin Carlucci Esq., Assistant Federal Public Defender, Newark

Ispasoiu, Mircea-Ilie Indictment

SOURCE: U.S. Attorney’s Office, District of New Jersey

 

According to the indictment, which does not name the victim entities:

“Victim 1” was a restaurant in or around Montclair, New Jersey,

“Victim 2” was a car dealership in or around North Brunswick, New Jersey,

“Victim 3” was a large security firm operating throughout the United States, and

“Victim 4” was a medical office in or around Phoenix, Arizona.

So… anyone want to name the four victim entities?


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Kaufman County's data breach was their second one in three weeks
Category: Business SectorHackHealth DataID TheftMalwareU.S.

Post navigation

← IE: Garda tells court Credit Union official showed his father his confidential financial statements
Ca: Cops called, but no charges in Service NL privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.