DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Three Romanian citizens plead guilty to participating in a multi-million dollar “vishing and smishing” scheme

Posted on March 8, 2019 by Dissent

ATLANTA – Robert Codrut Dumitrescu pleaded guilty to federal charges of wire fraud conspiracy, computer fraud and abuse, and aggravated identity theft in connection with a scheme, orchestrated from Romania, which resulted in the illegal intrusion into computer servers in the United States, deployment of phishing messages to thousands of victims, and subsequent theft of victims’ social security numbers and bank account information.  His conspirators, Teodor Laurentiu Costea and Cosmin Draghici, also pleaded guilty earlier this year to federal charges related to this scheme.

“These defendants thought they could hide behind their computers in Romania and defraud the citizens of the Northern District of Georgia and elsewhere across the United States,” said U.S. Attorney Byung J. “BJay” Pak.  “These guilty pleas resulted from a tireless investigative effort to locate these fraudsters and bring them to justice in our District.  We will continue to protect our citizens from cyber-criminals, no matter how far the investigation reaches.”

“Cyber criminals cannot hide in the shadows of the internet no matter where they are,” said Chris Hacker, Special Agent in Charge of FBI Atlanta. “The FBI won’t let geographic boundaries stop us from pursuing those persons who cause tremendous financial pain to U.S. citizens. To the victims of these three conspirators and other cyber criminals, we will continue to identify them and pursue justice.”

According to U.S. Attorney Pak, the charges, and other information presented in court: From approximately October 2011 through February 2014, Robert Codrut Dumitrescu, Teodor Laurentiu Costea and Cosmin Draghici conducted a “vishing” and “smishing” scheme from Romania.  “Vishing” is a type of phishing scheme that communicates a phishing message, that is, a message that purports to be from a legitimate source, in this case the victims’ banks, through a voice recording. “Smishing” is similar to “vishing,” but communicates a phishing message through text messages.

As part of the scheme, the defendants compromised computer servers located in the Northern District of Georgia, and elsewhere, and installed both interactive voice response and bulk emailing software which initiated thousands of telephone calls and text messages to victims in the Northern District of Georgia, and across the United States, tricking them into disclosing Personally Identifiable Information (PII) such as financial account numbers, PINs, and social security numbers.   When a victim received a telephone call, the recipient would be greeted by a recorded message falsely claiming to be a bank. The interactive voice response software would then prompt the victim to enter their PII.

When a victim received a text message, the message purported to be from a bank and directed the recipient to call a telephone number hosted by a compromised Voice Over Internet Protocol server. When the victim called the telephone number, they were prompted by the interactive voice response software to enter their PII. The stolen PII was stored on the compromised computer servers and accessed by Dumitrescu and Costea, who then sold or used the fraudulently obtained information with the assistance of Draghici.

At the time of their arrests in Romania, Dumitrescu possessed 3,278 financial account numbers, Costea possessed 36,050 financial account numbers, and Draghici possessed 3,465 financial account numbers – all fraudulently obtained through this scheme.   Based upon these numbers alone, the estimated loss amount is expected to exceed $21,000,000.

On August 16, 2017, a grand jury charged Robert Codrut Dumitrescu, 41, Teodor Laurentiu Costea, 42, and Cosmin Draghici, 29, all of Ploiesti, Romania, with multiple federal computer and fraud-related crimes in connection with this scheme.  Dumitrescu, Draghici, and Costea were extradited from Romania to Atlanta last year to face these charges.

Sentencing is scheduled for Costea on June 11, 2019 at 2:00 p.m., for Draghici on June 12, 2019 at 11:00 a.m., and for Dumitrescu on July 23, 2019 at 2:00 p.m., all before U.S. District Judge Thomas W. Thrash.

This case was investigated by the Federal Bureau of Investigation.

Assistant U.S. Attorney Michael Herskowitz, Chief of the Cyber and Intellectual Property Crime Section, is prosecuting the case.

Source: U.S. Attorney’s Office,  Northern District of Georgia


Related:

  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • Two Defendants Plead Guilty To Fraud Scheme Involving Data Stolen From Hospital Patients
  • 39-year-old Nigerian extradited to US from France over alleged hacking
Category: ID Theft

Post navigation

← Citrix discloses security breach of internal network
Rural Jackson County, Ga., recovering from Ryuk ransomware attack after paying $400,000 ransom →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.