DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VA: Twins indicted for hacking, wire fraud, and ID theft

Posted on May 5, 2015 by Dissent

On April 30, the Department of Justice announced the indictment of twin brothers Muneeb and Sohaib Akhter, 23, of Springfield, Virginia. They were charged with aggravated identity theft, conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization, access of a protected computer without authorization, conspiracy to access a government computer without authorization, false statements, and obstruction of justice.

According to the indictment, beginning in or about March 2014, the Akhter brothers and coconspirators hacked into the website of a cosmetics company and stole its customers’ credit card and personal information.  They used the stolen information to purchase goods and services, including flights, hotel reservations, and attendance at professional conferences.  In addition, the brothers and coconspirators devised a scheme to hack into computer systems at the U.S.  Department of State to access network traffic and to obtain passport information.

Court filings inspected by DataBreaches.net provide additional details on their scheme. The affidavit signed by DHS Special Agent Gershon Ross in support of the criminal complaint states that in June, 2014, Ross learned that Muneeb Akhter, who was then a DHS contractor, was boasting about hacking several e-commerce sites, including Subway, Starbucks, and an unspecified airline. Ross questioned Muneeb Akhter the next day, and Muneeb Akhter gave him a sworn statement admitting that he had created a computer code to gain unauthorized access to several e-commerce websites including KMart, Shell Gasoline, Whole Foods, Starbucks, and Dunkin Donuts. The code allowed him to add funds to gift cards without having to expend any actual funds. Muneeb would later tell an unindicted co-conspirator that there really was no such code.

When federal agents executed a search warrant in July, 2014, they seized Akhter’s phone, which provided evidence of numerous calls between the brothers and the unindicted co-conspirator. The three allegedly discussed their acquisition and possession of fraudulently obtained credit card numbers, and also discussed their use of credit card numbers and related account information that they had fraudulently obtained from an e-commerce cosmetics company called Shea Terra Organics. The twins’ mother is the registered owner of that web site. The government alleges her darling sons allegedly stole her customer’s information by installing key loggers that collected payment information and then inserting code that had the information emailed to them. Shea Terra is referred to as Victim Company 1 in the grand jury indictment.

Victim Company 2 was described as a company in Rockville Maryland that aggregates data and information about federal government contracts and packages it in products used by federal agencies and private contractors. The twins had been hired as contractors by the firm.

Muneeb began working at General Dynamics in June, 2014 and began working as an Information Technology Security Specialist at DHS (insert facepalm here), which is where Special Agent Ross first heard of his boasts.

From October 2014 – February 2015, Sohaib Akhter was a contact employee for ActioNet, a contractor for the State Department, and as noted above, some of the charges stem from the brothers’ activities while he was employed for them.

In a stupid criminals aspect to the case, Ross notes that when he searched Facebook for information on the twins, he found a Facebook page that appeared to be for Sohaib Akhter. That page had an image a United Airlines boarding pass for “Sohaib Akhter” departing January 19, 2015, from Washington, DC, to San Francisco, CA, on United Airlines flight 782. United Airlines confirmed that the flight was paid for with an American Express card. The card owner told Ross that s/he had not authorized that purchase, that the account had been closed as a result of credit card fraud, and that the card had been previously used to make  purchases on the Shea Terra web site.

That wasn’t the only image found on Facebook that would come back to bite the defendants. Another image showed them together at the 2014 TechConnect World Innovation Conference & Expo. They had paid for their registration with stolen credit card information.

Muneeb Akhter faces a maximum penalty of 59 years in prison if convicted on all counts, and Sohaib Akhter faces a maximum penalty of 39 years in prison if convicted on all counts. They are, of course, presumed innocent until convicted.

h/t, Arrest Tracker

 

 


Related:

  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Business SectorGovernment SectorHackInsiderMalwareU.S.

Post navigation

← CA: Santa Maria Coco’s Restaurant closes suddenly; ex-employees say personal info left in dumpster
Lawsuit: Home Depot data breach was caused by management’s ‘overarching complacency’ over security →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.