Four indicted in $1.5M ATM skimming operation

Prosecutors allege members of the group actually entered bank branches to modify card readers and steal data
  • (IDG News Service)
  • — 08 June, 2011 02:16

Three Romanian men and one Austrian man were indicted on Monday by U.S. federal prosecutors for allegedly stealing more than US$1.5 million by cloning payment cards with stolen account information.

The men are accused of so-called skimming, or recording account details from the magnetic stripe of payment cards while also capturing a person's PIN (Personal Identification Number) by using fake overlays on the number pads.

Prosecutors said the gang targeted accounts at Citibank and JP Morgan Chase and Co. between March 2010 and May 2011 in cities including New York, Miami and Chicago.

Mihail Draghici, Ionel Dedulescu and Laurentiu Mugurel Manta, all of Romania, are charged with conspiracy to commit fraud, conspiracy to commit access device fraud and aggravated identity theft.

The Austrian man, Didi Theodor Ciulei, was indicted on the same charges. Draghici and Dedulescu were additionally charged with bank fraud and could face a maximum of 69 and a half years in prison. Ciulei and Manta face up to 62 years if convicted. They were indicted in the U.S. District Court for the Southern District of New York, located in Manhattan.

The case stands out in particular for its boldness. Many criminals try to fit skimming devices on ATM machines outside, often late at night wearing a hood that can obscure them from being identified by security cameras, which are often positioned to monitor the machines.

But the four men charged in this case are alleged to have actually entered bank branches and modified card readers near the tellers. The men allegedly replaced the PIN pads with ones that could record the secret number along with the card's account information and then remotely transmit it.

They also allegedly harvested card information from card readers outside ATM vestibules. Many ATMs are located inside locked vestibules where customers must swipe their payment card in order to unlock the door. The men are also accused of using overlay number pads that fit over the normal pad.

Once they captured the information, the group then allegedly encoded the account information onto cards with magnetic stripes, such as gift cards, using a device called a magnetic stripe reader or writer. Once the cards were encoded and PINs in hand, it's then possible to start making withdrawals.

Send news tips and comments to jeremy_kirk@idg.com

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Topics: U.S. Department of Justice, Criminal, security, legal, data breach, data protection, fraud, cybercrime
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?