DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Two Sentenced in ID Theft and Credit Card Scheme Involving Flanigan’s Customers

Posted on May 20, 2011 by Dissent

Jose Cruz, 28, and Lisandra Cruz, 19, both of Hialeah, Florida were sentenced yesterday in federal court to 75 months and 48 months in prison, respectively. A co-defendant, Yuremys Marchante, 30, also of Hialeah, was sentenced to 57 months in prison on April 19, 2011.

All three defendants were convicted at trial on charges of conspiracy to commit access device fraud, unauthorized use of access devices, and aggravated identity theft. A fourth defendant, Alexis Toledo, was sentenced on April 8, 2011, after pleading guilty. All of the defendants have been ordered to pay restitution in an amount to be determined at a later hearing.

According to evidence presented at trial, between April 30, 2010 and May 29, 2010, Cruz and Marchante recruited Toledo to skim credit card numbers from customers at a Flanigan’s restaurant in Hialeah, where Toledo was employed. The stolen credit card numbers were then later used by Cruz and Marchante to make dozens of fraudulent purchases from a Target store in Miami Gardens, where Lisandra Cruz, Jose’s sister, worked as a cashier. The transactions were recorded on video.

At yesterday’s hearing, U.S. District Judge Jose E. Martinez concluded that defendants Jose Cruz and Yuremys Marchante were each responsible for a loss amount between $120,000 and $200,000, in fraud and also imposed a two-level increase in determining their sentencing guidelines, after finding that both were leaders and organizers of the conspiracy.

According to the indictment, it appears that they were charged with misusing two customers’ credit card numbers, but a proffer of proof with respect the former Flanigan’s employee suggests that 85 customers’ card numbers may have been skimmed by the employee over a period of approximately one month – she was reportedly paid $1700 after agreeing to $20/card number skimmed.

I cannot find any previous reference to a breach involving Flanigan’s and am curious as to whether or when customers were notified that their numbers had been skimmed.  The two whose numbers are listed in the charges/indictment clearly knew their numbers had been misused, but did anyone notify the other customers?  If so, who – and when?

Source: United States Attorney’s Office for the Southern District of Florida and court records obtained from PACER.


Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
Category: Breach IncidentsBusiness SectorID TheftInsiderSkimmersU.S.

Post navigation

← UK: ICO called on to punish Milton Keynes Council
Ca: Adding injury to pain: patients' data on stolen drive (update2) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.