Four Romanians charged with multimillion-dollar hack of Subway, others

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Sophos said:
Four Romanian nationals have been arrested in connection with a multimillion-dollar scheme to remotely steal payment card data from the point-of-sale systems of more than 150 Subway restaurants and other U.S. businesses, according to the U.S. Department of Justice.

The indictment, unsealed on Wednesday, charges the four with conspiracy to commit computer fraud, wire fraud and access device fraud.

Charged in U.S. District Court for the District of New Hampshire were Adrian-Tiberiu Oprea, 27, of Constanta, Romania; Iulian Dolan, 27, of Craiova; Cezar Iulian Butu, 26, of Ploiesti; and Florin Radu, 23, of Rimnicu Vilcea.

Authorities last week arrested Oprea in Romania, where he is still in custody. Dolan and Butu were arrested when they entered the U.S. in August and are still in custody.

Radu is still at large. There are more conspirators, but authorities appear to only know the online names of two of the missing conspirators: tonymontanamiami and marcos_grande6.

The DOJ claims that the thieves got their hands on the credit, gift and debit card data of more than 80,000 customers.

A POS system typically consists of a computer, monitor, and a debit/credit card reader. Most also include an integrated credit card processing system, a signature capture device and a customer pin pad device for entering passwords.

Although the indictment doesn’t identify the POS system used by Subway, Wired's Kim Zetter reports that the chain announced in January 2009 that it was deploying the Torex Quick Service POS in all of its 30,000 restaurants.

Between roughly April 2008 until at least May 2011, the DOJ says the suspects swiped credit card data from compromised Subway restaurant systems in New Hampshire, New York, California and elsewhere to charge millions of dollars worth of purchases.

According to the indictment, this is how they did it:

  • They remotely scanned the Internet to identify vulnerable POS systems with certain remote desktop software applications installed.
  • They then logged onto the targeted POS systems, either by guessing the passwords or with password-cracking software programs.
  • The conspirators then installed keystroke loggers onto the POS systems to record and store data that was keyed into or swiped through the merchants’ POS systems, including credit card data.
  • They then installed a back-door Trojan into the POS systems to enable them to easily access the compromised POS systems in the future, to install or re-install additional hacker tools. The indictment charges the four with repeatedly downloading one particular hacker tool designed to evade detection, “xp.exe,” from the “kitsite.info” dump site onto the victimized merchants' POS terminals.
  • The credit card data was then transferred back to dump sites—i.e., servers used for storage, some of which were located in Europe, some in the U.S.

Read more >>
 
P

Plexx

It is interesting how they managed to bypass the security... but then again who's to blame here? Subway.... They should have invested more in the security... 3 years of heaven for those guys has now going to be hell behind bars.

Got to admit tho Black Hat Hacking is getting more popular on the Eastern Europe. These guys should convert into White Hat Hacking tho.
 

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
One of this guys is actually from my city... and it's activities were know to the local law enforcement agencies and they never took any kind of action to stop this guy .....when there are some much money involved the corruption is reaches high levels...
 
P

Plexx

I work in a call center where one of our branch call centers is in District 3 of Bucharest. Haven't been sent there in a business trip but one day I will step foot there.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top