DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Cybercriminal Sentenced To 50 Months For His Role In Hacking Campaign

Posted on July 5, 2015 by Dissent

The following press release from the U.S. Attorney’s Office for the Eastern District of New York provides an update on a case noted previously on this site involving a hack of JP Morgan Chase to alter prepaid debit cards issued by the American Red Cross for disaster relief victims:

June 29 – Earlier today at the federal courthouse in Brooklyn, Qendrim Dobruna, a member of an international cybercrime syndicate, was sentenced to 50 months’ imprisonment and restitution in the amount of $14 million for his role in hacking into the computer systems of U.S.-based financial institutions, stealing prepaid debit card data, and eliminating withdrawal limits. The stolen card data was then disseminated worldwide and used in making fraudulent ATM withdrawals in excess of $14 million in a single weekend. The sentencing was held before U.S. District Judge I. Leo Glasser. Dobruna pleaded guilty to bank fraud on July 11, 2014.

The sentence was announced by Kelly T. Currie, Acting United States Attorney for the Eastern District of New York, and Robert J. Sica, Special Agent in Charge, United States Secret Service, New York Field Office.

“The defendants and his co-conspirators participated in a massive 21st century heist that stretched around the globe. Using sophisticated methods, the organization reached into the computer systems of American-based corporations and transmitted illegally obtained private financial information to confederates in 18 different countries who stole millions of dollars from hundreds of ATMs in a matter of hours,” stated Acting United States Attorney Currie. “Today’s sentence serves as a warning to cybercriminals around the world that law enforcement is committed to solving these cybercrimes, no matter how sophisticated, and bringing the perpetrators to justice, wherever they may be found.”

“This operation demonstrates that combining international law enforcement resources sends a strong message to criminals, that there is no such thing as anonymity in the cyber world. Secret Service agents utilize state-of-the-art investigative techniques to identify and pursue cyber criminals around the world. The adverse impact this individual and other transnational organized criminal groups have on our nation’s financial infrastructure is significant and should not be underestimated,” said Secret Service Special Agent in Charge Robert J. Sica.”

Between approximately February 27, 2011 and March 1, 2011, the defendant and his co-conspirators conducted an “Unlimited Operation,” which begins when the cybercrime organization hacks into the computer systems of a credit card processor, compromises prepaid debit card accounts, and essentially eliminates the withdrawal limits and account balances of those accounts. The elimination of withdrawal limits enables the hackers and their co-conspirators to withdraw unlimited amounts of cash until the operation is shut down. Next, the cybercrime organization cashes in, by distributing the hacked prepaid debit card numbers to trusted associates around the world, who then immediately withdraw cash from ATMs across the globe. At the end of an operation, when the cards are finally shut down, the casher cells launder the proceeds – often investing the operation’s proceeds in luxury goods – and kick back money to the cybercrime organization’s leaders. On February 27, 2011, hackers targeted a credit card processor that processed transactions for prepaid debit cards issued by the American Red Cross for disaster relief victims. After the hackers penetrated the credit card processor’s computer network, compromised the American Red Cross prepaid card accounts, and manipulated the balances and withdrawal limits, casher cells across the globe operated a coordinated ATM withdrawal campaign. In total, more than 15,000 ATM transactions were conducted in approximately 18 countries around the world using 21 compromised American Red Cross disaster relief prepaid cards, resulting in approximately $14 million in losses to the credit card processor and the American Red Cross.

The defendant, from his apartment in Stuttgart, Germany, participated in the cyber-attack by obtaining account information from the co-conspirators who directly hacked into the U.S.-based financial institution’s database and selling that account information to other co-conspirators over the Internet, including to an individual in Brooklyn, New York.

In announcing the guilty plea, Acting United States Attorney Currie praised the extraordinary efforts of the Secret Service in responding so rapidly to these attacks and investigating both the complex network intrusions that occurred overseas and the criminal activity occurring locally. Mr. Currie also thanked the American Red Cross for their cooperation with this investigation.

The government’s case is being prosecuted by Assistant United States Attorney Amir H. Toossi.

Category: Financial SectorHackU.S.

Post navigation

← ME: Windham Man Sentenced to Three Months for Fraud and Identity Theft
Hacking Team hacked, all files dumped (Update 2) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.