DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Employee Of Global Financial Services Company Charged With Unauthorized Access Of Supervisor’s Email Account On Approximately 100 Occasions

Posted on December 12, 2015 by Dissent

Another CFAA case. Although the victim company is not named, the defendant’s LinkedIn profile indicates that he was employed at Western Asset Management from March 2007 – March 2011. How he was able to access his former supervisor’s email account years after he left their employ is not addressed in the press release, but raises questions as to whether that supervisor ever changed his email password. From the U.S. Attorney’s Office, this press release:

On Wednesday, Preet Bharara, the United States Attorney for the Southern District of New York, and Diego Rodriguez, Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a complaint charging KRISTOPHER ROCCHIO with computer fraud, stemming from his repeated unauthorized access of his former supervisor’s email account from at least August 2013 through in or about February 2015.  ROCCHIO was arrested Wednesday morning.

According to the allegations contained in the criminal complaint:

From February 2008 through March 2012, ROCCHIO was employed by a global fixed-income financial services company with an office in New York, New York (the “Company”).  While employed by the Company, ROCCHIO had a direct supervisor (the “Supervisor”).  During ROCCHIO’s employment, the Supervisor never gave ROCCHIO permission to read the Supervisor’s email account at the Company (the “Supervisor’s Email”), and never knowingly gave ROCCHIO the password to the Supervisor’s Email.

In March of 2012, ROCCHIO left the Company.  On or about February 25, 2015, the Supervisor received an email bounce back message to the Supervisor’s Email.  The message indicated that an email sent from the Supervisor’s Email could not be delivered (the “Failed Email”).  The Supervisor had not personally attempted to send the Failed Email.  The Supervisor then checked the sent mail folder of the Supervisor’s Email and noticed two emails in the folder that the Supervisor had not personally sent.  One email was the Failed Email.  The other email (the “February 25 Email”) was sent to another email address (the “Email Account”).  The content of both the Failed Email and the February 25 Email was the same, and included a password-protected attachment that detailed, among other things, the compensation and performance evaluations for numerous employees at the Company.  Later that same day, the Supervisor checked the sent mail folder of the Supervisor’s Email again, but both the Failed Email and the February 25 Email had been deleted by someone other than the Supervisor.

FBI agents reviewed records from the Email Account and learned that the subscriber for the Email Account is ROCCHIO.  The Email Account contains the February 25 Email.  The Email Account also contains an earlier email from the Supervisor’s Email sent on or about December 21, 2013 (the “December 21 Email”).  The December 21 Email has an attachment, which is a PowerPoint presentation that contained internal metrics of the Company.  Also on or about December 21, 2013, the Email Account forwarded the December 21 Email to an email account associated with ROCCHIO (“Email Account-2”) at another financial services company in New York, New York (“Company-2”).  Email Account-2 then forwarded the December 21 Email to another employee at Company-2.  Company-2 employed ROCCHIO from May 2013 through July 2015.

Records of remote access to the Supervisor’s Email reveal a number of IP addresses used to access the Supervisor’s Email.  Three of the IP addresses – which collectively accessed the Supervisor’s Email at least 79 times – were assigned to ROCCHIO.  One of the IP addresses – which accessed the Supervisor’s Email at least 15 times – was assigned to Company-2.  One of the IP addresses that accessed the Supervisor’s Email was assigned to a hotel in Chicago, Illinois, where ROCCHIO was staying at the time of the access into the Supervisor’s Email.

*                *                *

ROCCHIO, 38, of Staten Island, New York, is charged with two counts of computer fraud, in violation of Title 18, United States Code, Section 1030.  Each count carries a maximum penalty of five years in prison.  The statutory maximum sentences are prescribed by Congress and are provided here for informational purposes only, as any sentence imposed on the defendant will be determined by the Court.

Mr. Bharara praised the outstanding efforts of the FBI and its New York Cyber Division.

The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit.  Assistant United States Attorney Megan Gaffney is in charge of the prosecution.

The charges contained in the Complaint are merely accusations and the defendant is presumed innocent unless and until proven guilty.

SOURCE: U.S. Attorney’s Office, Southern District of New York

Category: Financial SectorInsiderU.S.

Post navigation

← NZ: Data breaches at Television New Zealand
Pittsburgh-area counselor stole $600K through alleged insurance fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.