DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Brazilian Man Charged With Making Extortionate Threats To Publicize Stolen Data Obtained By Unlawful Computer Intrusion

Posted on December 26, 2024 by Dissent

December 23, Newark, N.J. – A citizen and resident of Brazil was charged with making extortionate threats to publicize data stolen from the Brazilian subsidiary of a New Jersey company, U.S. Attorney Philip R. Sellinger announced.

Junior Barros De Oliveira, 29, of Curitiba, Brazil was charged with four counts of extortionate threats involving information obtained from protected computers in violation of Title 18, United States Code, Section 1030(a)(7)(B) and four counts of threatening communications in violation of Title 18, United States Code, Section 875(d) in an indictment unsealed today in Newark federal court.

According to the Indictment:

In March 2020, De Oliveira gained unauthorized access and exceeded authorized access to the computer systems of Victim 1-Brazil, the Brazilian subsidiary of a New Jersey company.  Exploiting this access, De Oliveira obtained confidential customer information relating to approximately 300,000 customers of Victim 1-Brazil.  In September 2020, De Oliveira began contacting U.S. representatives of Victim 1, including its CEO, in an attempt to extort money from Victim 1-Brazil.  De Oliveira demanded over approximately $3,000,000 in Bitcoin in exchange for keeping the stolen data confidential and not publicizing it.

Each of the four counts of making extortionate threats in relation to information obtained from protected computers carry a maximum prison term of 5 years, and a maximum fine of $250,000 or twice the value of any gain or loss, whichever is greater.  Each of the four counts of threatening communications carry a maximum prison term of 2 years, and a maximum fine of $250,000 or twice the value of any gain or loss, whichever is greater.

U.S. Attorney Sellinger credited special agents of the Federal Bureau of Investigation (“FBI”)’s Newark Field Office, under the direction of Acting Special Agent in Charge Nelson I. Delgado.

The government is represented by Assistant U.S. Attorney David E. Malagold of the Cybercrime Unit in Newark.

The charges and allegations contained in the indictment are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

deoliveira.indictment.pdf

Source: U.S. Attorney’s Office, District of New Jersey

The indictment includes the wording of his ransom demands and emails to executives.  If anyone recognizes the case and knows what the victim company was or the moniker this defendant may have been using online, please let me know.


Related:

  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Oracle silently fixes zero-day exploit leaked by ShinyHunters
  • Capita hit with £14m fine for personal data breach in 2023 cyber attack
  • In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. (1)1)
Category: Hack

Post navigation

← Japan Airlines recovers from cyberattack, confirms no customer data leaks
2024’s Data Breaches: Breaches Handled Badly →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.