DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Employee Of Global Financial Services Company Charged With Unauthorized Access Of Supervisor’s Email Account On Approximately 100 Occasions

Posted on December 12, 2015 by Dissent

Another CFAA case. Although the victim company is not named, the defendant’s LinkedIn profile indicates that he was employed at Western Asset Management from March 2007 – March 2011. How he was able to access his former supervisor’s email account years after he left their employ is not addressed in the press release, but raises questions as to whether that supervisor ever changed his email password. From the U.S. Attorney’s Office, this press release:

On Wednesday, Preet Bharara, the United States Attorney for the Southern District of New York, and Diego Rodriguez, Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a complaint charging KRISTOPHER ROCCHIO with computer fraud, stemming from his repeated unauthorized access of his former supervisor’s email account from at least August 2013 through in or about February 2015.  ROCCHIO was arrested Wednesday morning.

According to the allegations contained in the criminal complaint:

From February 2008 through March 2012, ROCCHIO was employed by a global fixed-income financial services company with an office in New York, New York (the “Company”).  While employed by the Company, ROCCHIO had a direct supervisor (the “Supervisor”).  During ROCCHIO’s employment, the Supervisor never gave ROCCHIO permission to read the Supervisor’s email account at the Company (the “Supervisor’s Email”), and never knowingly gave ROCCHIO the password to the Supervisor’s Email.

In March of 2012, ROCCHIO left the Company.  On or about February 25, 2015, the Supervisor received an email bounce back message to the Supervisor’s Email.  The message indicated that an email sent from the Supervisor’s Email could not be delivered (the “Failed Email”).  The Supervisor had not personally attempted to send the Failed Email.  The Supervisor then checked the sent mail folder of the Supervisor’s Email and noticed two emails in the folder that the Supervisor had not personally sent.  One email was the Failed Email.  The other email (the “February 25 Email”) was sent to another email address (the “Email Account”).  The content of both the Failed Email and the February 25 Email was the same, and included a password-protected attachment that detailed, among other things, the compensation and performance evaluations for numerous employees at the Company.  Later that same day, the Supervisor checked the sent mail folder of the Supervisor’s Email again, but both the Failed Email and the February 25 Email had been deleted by someone other than the Supervisor.

FBI agents reviewed records from the Email Account and learned that the subscriber for the Email Account is ROCCHIO.  The Email Account contains the February 25 Email.  The Email Account also contains an earlier email from the Supervisor’s Email sent on or about December 21, 2013 (the “December 21 Email”).  The December 21 Email has an attachment, which is a PowerPoint presentation that contained internal metrics of the Company.  Also on or about December 21, 2013, the Email Account forwarded the December 21 Email to an email account associated with ROCCHIO (“Email Account-2”) at another financial services company in New York, New York (“Company-2”).  Email Account-2 then forwarded the December 21 Email to another employee at Company-2.  Company-2 employed ROCCHIO from May 2013 through July 2015.

Records of remote access to the Supervisor’s Email reveal a number of IP addresses used to access the Supervisor’s Email.  Three of the IP addresses – which collectively accessed the Supervisor’s Email at least 79 times – were assigned to ROCCHIO.  One of the IP addresses – which accessed the Supervisor’s Email at least 15 times – was assigned to Company-2.  One of the IP addresses that accessed the Supervisor’s Email was assigned to a hotel in Chicago, Illinois, where ROCCHIO was staying at the time of the access into the Supervisor’s Email.

*                *                *

ROCCHIO, 38, of Staten Island, New York, is charged with two counts of computer fraud, in violation of Title 18, United States Code, Section 1030.  Each count carries a maximum penalty of five years in prison.  The statutory maximum sentences are prescribed by Congress and are provided here for informational purposes only, as any sentence imposed on the defendant will be determined by the Court.

Mr. Bharara praised the outstanding efforts of the FBI and its New York Cyber Division.

The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit.  Assistant United States Attorney Megan Gaffney is in charge of the prosecution.

The charges contained in the Complaint are merely accusations and the defendant is presumed innocent unless and until proven guilty.

SOURCE: U.S. Attorney’s Office, Southern District of New York

No related posts.

Category: Financial SectorInsiderU.S.

Post navigation

← NZ: Data breaches at Television New Zealand
Pittsburgh-area counselor stole $600K through alleged insurance fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.