Skip to comments.In Hours, Thieves Took $45 Million in A.T.M. Scheme
Posted on 05/10/2013 4:27:55 PM PDT by dennisw
It was a brazen bank heist, but a 21st-century version in which the criminals never wore ski masks, threatened a teller or set foot in a vault.
In two precision operations that involved people in more than two dozen countries acting in close coordination and with surgical precision, thieves stole $45 million from thousands of A.T.M.'s in a matter of hours.
In New York City alone, the thieves responsible for A.T.M. withdrawals struck 2,904 machines over 10 hours starting on Feb. 19, withdrawing $2.4 million.
The operation included sophisticated computer experts operating in the shadowy world of Internet hacking, manipulating financial information with the stroke of a few keys, as well as common street criminals, who used that information to loot the automated teller machines.
The first to be caught was a street crew operating in New York, their pictures captured as, prosecutors said, they traveled the city withdrawing money and stuffing backpacks with cash.
On Thursday, federal prosecutors in Brooklyn unsealed an indictment charging eight men including their suspected ringleader, who was found dead in the Dominican Republic last month. The indictment and criminal complaints in the case offer a glimpse into what the authorities said was one of the most sophisticated and effective cybercrime attacks ever uncovered.
It was, prosecutors said, one of the largest heists in New York City history, rivaling the 1978 Lufthansa robbery, which inspired a scene in the movie Goodfellas.
(Excerpt) Read more at nytimes.com ...
Foreigners love America!
We should import thousands more before the next Boston Marathon!
MAn I need a student
loan for college that will teach me how to do this!
“In Hours, Thieves Took $45 Million in A.T.M. Scheme”
Is the start of fundraising for Hillary in 2016?
Only soft stoopid Americans have not figured out that foreigners (especially those in the 3rd world) see this country as ripe for the picking
Your money is safe, put it in the bank. FDIC insured, by the same fed who is financing almost 50% of the population on welfare programs. The same FED who plans to provide welfare to 30 million illegal criminal aliens.
What could go wrong? They can always tax more and print more money. Or take over the retirement funds....
Be afraid, be very afraid.
And they attack folks who want to protect America? Ain’t Globalism great!
These guys are pikers compared to the US gov.
Multiple this by tens of millions of other foreigner and illegals collecting food stamps, welfare, medical, etc., you name it...
It's costing the American tax payers, many of whom are on their knees, TRILLIONS.
But that's all A-OK and all sanctioned by government, paid for by the tax payers.
Just don't steal from the banksters.
No joke huh?
Amateurs. Food stamp, WIC, SSDI, free phones, subsidized housing and Medicaid go through $45 mil in about 10 minutes...
This makes the Lufthansia heist look like a bunch of pikers.
NOTE The following text is a quote:
Eight Members Of New York Cell Of Cybercrime Organization Indicted In $45 Million Cybercrime Campaign
FOR IMMEDIATE RELEASE May 09, 2013
New York Cell Withdrew $2.8 Million In Cash From Hacked Accounts In Less Than 24 Hours
A four-count federal indictment was unsealed in Brooklyn charging eight defendants with participating in two worldwide cyberattacks that inflicted $45 million in losses on the global financial system in a matter of hours.1 These defendants allegedly formed the New York-based cell of an international cybercrime organization that used sophisticated intrusion techniques to hack into the systems of global financial institutions, steal prepaid debit card data, and eliminate withdrawal limits. The stolen card data was then disseminated worldwide and used in making fraudulent ATM withdrawals on a massive scale across the globe. The eight indicted defendants and their co-conspirators targeted New York City and withdrew approximately $2.8 million in a matter of hours. The defendants are charged variously with conspiracy to commit access device fraud, money laundering conspiracy, and money laundering.
Seven of the eight defendants have been arrested on the charges in the indictment: the arrested defendants are Jael Mejia Collado, Joan Luis Minier Lara, Evan Jose Peña, Jose Familia Reyes, Elvis Rafael Rodriguez, Emir Yasser Yeje, and Chung Yu-Holguin, all residents of Yonkers, New York. Rodriguez was arrested on a criminal complaint on March 27, 2013, when he attempted to flee the United States for the Dominican Republic. Peña was arrested on a criminal complaint in Yonkers, New York, on April 3, 2013. Lara, Reyes, and Yeje surrendered to law enforcement authorities on April 15, 2013, and Collado and Yu-Holguin were arrested yesterday afternoon. The indictment also charges an eighth defendant, Alberto Yusi Lajud-Peña, also known as Prime and Albertico, who is reported to have been murdered on April 27, 2013, in the Dominican Republic. The case has been assigned to United States District Judge Kiyo A. Matsumoto.
The charges were announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York, Steven Hughes, Special Agent in Charge, United States Secret Service, New York Field Office, and James T. Hayes, Jr., Special Agent in Charge, U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI), New York.
As charged in the indictment, the defendants and their co-conspirators participated in a massive 21st century bank heist that reached across the Internet and stretched around the globe. In the place of guns and masks, this cybercrime organization used laptops and the Internet. Moving as swiftly as data over the Internet, the organization worked its way from the computer systems of international corporations to the streets of New York City, with the defendants fanning out across Manhattan to steal millions of dollars from hundreds of ATMs in a matter of hours, stated United States Attorney Lynch. Law enforcement is committed to moving just as swiftly to solve these cybercrimes and bring their perpetrators to justice.
New technologies and the rapid growth of the Internet have eliminated the traditional borders of financial crimes and provided new opportunities for the criminal element to threaten the worlds financial systems. However, as demonstrated by the charges and arrests announced today, the Secret Service and its law enforcement partners have adapted to these technological advancements and utilized cutting edge investigative techniques to thwart this cybercriminal activity, said Secret Service Special Agent in Charge Hughes. I want to take this opportunity to commend the dedicated men and women of the Secret Service and HSI for their extraordinary efforts in this investigation. This case is an excellent example of the impact that can be made when the law enforcement community works together.
The arrests today reflect the governments joint efforts to bring a global cybercrime enterprise to justice, said HSI Special Agent in Charge Hayes. HSI is proud to be part of a proactive federal law enforcement initiative that uses its collective resources to pull the plug on those who attempt to use the Internet to commit bank robbery.
The Unlimited Operation
As alleged in the indictment and other court filings, the cyberattacks employed by the defendants and their co-conspirators in this case are known in the cyber underworld as Unlimited Operations through its hacking operation, the cybercrime organization can access virtually unlimited criminal proceeds.
The Unlimited Operation begins when the cybercrime organization hacks into the computer systems of a credit card processor, compromises prepaid debit card accounts, and essentially eliminates the withdrawal limits and account balances of those accounts. The elimination of withdrawal limits enables the participants to withdraw literally unlimited amounts of cash until the operation is shut down. Unlimited Operations are marked by three key characteristics: (1) the surgical precision of the hackers carrying out the cyberattack, (2) the global nature of the cybercrime organization, and (3) the speed and coordination with which the organization executes its operations on the ground. These attacks rely upon both highly sophisticated hackers and organized criminal cells whose role is to withdraw the cash as quickly as possible.
As alleged in court filings, Unlimited Operations are executed in the following manner: First, over the course of months, the hackers plan and execute sophisticated cyber intrusions to gain unauthorized access to the computer networks of credit card processors that are responsible for processing prepaid debit card transactions. They target databases of prepaid debit cards, which are typically loaded with finite funds; such cards are used by many employers in lieu of paychecks and by charitable organizations to distribute disaster assistance. The cybercriminals breach the debit card accounts security protocols, then dramatically increase the balances and effectively eliminate the withdrawal limits on the accounts. The elimination of withdrawal limits enables the participants to withdraw unlimited amounts of cash until the operation is shut down. Next, the cybercrime organization cashes in, by distributing the hacked prepaid debit card numbers to trusted associates around the world the two cyberattacks charged in this case allegedly involved 26 countries. These associates operate cells or teams of cashers, who encode magnetic stripe cards, such as gift cards, with the compromised card data. When the cybercrime organization distributes the personal identification numbers (PINs) for the hacked accounts, the casher cells spring into action, immediately withdrawing cash from ATMs across the globe. Meanwhile, the cybercrime organization maintains access to the computer networks of the credit card processors they have hacked in order to monitor the withdrawals. At the end of an operation, when the cards are finally shut down, the casher cells launder the proceeds, often investing the operations proceeds in luxury goods, and kick money back up to the cybercrime organizations leaders.
The Charged Unlimited Operation Cyberattacks
According to the governments filings, between approximately October 2012 and April 2013, the defendants and their co-conspirators conducted two Unlimited Operations. The first operation, on December 22, 2012, targeted a credit card processor that processed transactions for prepaid MasterCard debit cards issued by the National Bank of Ras Al-Khaimah PSC, also known as RAKBANK, in the United Arab Emirates. After the hackers penetrated the credit card processors computer network, compromised the RAKBANK prepaid card accounts, and manipulated the balances and withdrawal limits, casher cells across the globe operated a coordinated ATM withdrawal campaign. In total, more than 4,500 ATM transactions were conducted in approximately 20 countries around the world using the compromised RAKBANK account data, resulting in approximately $5 million in losses to the credit card processor and RAKBANK. In the New York City area alone, over the course of just two hours and 25 minutes, the defendants and their co-conspirators conducted approximately 750 fraudulent transactions, totaling nearly $400,000, at over 140 different ATM locations in New York City.
As alleged in the indictment and other court filings, the second of these Unlimited Operations occurred on the afternoon of February 19 and lasted into the early morning of February 20, 2013. This operation again breached the network of a credit card processor that serviced MasterCard prepaid debit cards, this time issued by the Bank of Muscat, located in Oman. Again, after the cybercrime organizations hackers compromised Bank of Muscat prepaid debit card accounts and distributed the data, the organizations casher cells engaged in a worldwide ATM withdrawal campaign. This attack was particularly devastating: Over the course of approximately 10 hours, casher cells in 24 countries executed approximately 36,000 transactions worldwide and withdrew about $40 million from ATMs. From 3 p.m. on February 19 through 1:26 a.m. on February 20, the defendants and their co-conspirators withdrew approximately $2.4 million in nearly 3,000 ATM withdrawals in the New York City area.
As charged in the indictment and other filings, defendant Alberto Yusi Lajud-Peña was the leader of the New York cell of this organization, and in the wake of the charged Unlimited Operations, he and defendants Elvis Rafael Rodriguez and Emir Yasser Yeje laundered hundreds of thousands of dollars in illicit cash proceeds. In one transaction alone, nearly $150,000 in the form of 7,491 $20 bills, was deposited at a bank branch in Miami, Florida, into an account controlled by defendant Alberto Yusi Lajud-Peña. Cell members also invested the criminal proceeds in portable luxury goods, such as expensive watches and cars. To date, the United States has seized hundreds of thousands of dollars in cash and bank accounts, two Rolex watches and a Mercedes SUV, and is in the process of forfeiting a Porsche Panamera. The Mercedes and Porsche were purchased with $250,000 in proceeds of this scheme.
In announcing the charges, United States Attorney Lynch praised the extraordinary efforts of the Secret Service in responding so rapidly to these attacks and investigating both the complex network intrusions that occurred overseas and the criminal activity occurring locally. Ms. Lynch also thanked the Department of Homeland Security for its invaluable role in recent arrest and seizure operations, as well as MasterCard, RAKBANK, and the Bank of Muscat for their cooperation with this investigation. Ms. Lynch expressed gratitude for the timely and extensive assistance of law enforcement authorities in Japan, Canada, Germany, and Romania, and also thanked authorities in the United Arab Emirates, Dominican Republic, Mexico, Italy, Spain, Belgium, France, United Kingdom, Latvia, Estonia, Thailand, and Malaysia for their cooperation in this investigation.
If convicted, the defendants face a maximum sentence of 10 years imprisonment on each of the money laundering charges and 7.5 years on the conspiracy to commit access device fraud charge, restitution, and up to $250,000 in fines. In addition, all property involved in the money laundering offenses and all proceeds of the conspiracy to commit access device fraud are subject to forfeiture.
The governments case is being prosecuted by Assistant United States Attorneys Cristina M. Posa, Hilary Jager, Brian Morris, and Kevin Trowel.
ALBERTO YUSI LAJUD-PEÑA (deceased)
JAEL MEJIA COLLADO
JOAN LUIS MINIER LARA
EVAN JOSE PEÑA
JOSE FAMILIA REYES
ELVIS RAFAEL RODRIGUEZ
EMIR YASSER YEJE
1 The charges contained in the indictment are merely allegations, and the defendants are presumed innocent unless and until proven guilty.
Indictment - Copy - Link:
>> The elimination of withdrawal limits