Mobile

11/9/2018
12:45 PM
50%
50%

Guilty Plea Made in Massive International Cell Phone Fraud Case

A former West Palm Beach resident is the fifth defendant to plead guilty in a case involving thousands of victims.

Penalties in a global cell phone fraud scheme continue to mount as a fifth defendant has pleaded guilty in connection to the case. Braulio De la Cruz Vasquez, a 54-year-old former resident of West Palm Beach, Fla., entered pleas in the Southern District of Florida.

De la Cruz pleaded guilty to one count of wire fraud, one count of aggravated identity theft, and one count of conspiracy to commit wire fraud, access device fraud, the use, production or possession of modified telecommunications instruments and the use or possession of hardware or software configured to obtain telecommunications services.

According to the US Department of Justice, the scheme involved stealing access to existing cell phone accounts, then fraudulently opening new accounts based on the information. In his admission of guilt, De la Cruz said that thousands of international calls would be routed via the internet to his residence, where phones programmed with the fraudulent accounts would be used to place the calls to countries such as Cuba, Jamaica, and the Dominican Republic, while the charges were billed to the original customers' accounts.

De la Cruz received amounts in the tens of thousands of dollars from VoIP companies for routing the calls. Sentencing is scheduled for Jan. 18, 2019; others in the case have already received sentences of 36 to 75 months for their roles in the scheme.

For more, read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10014
PUBLISHED: 2019-03-24
In DedeCMS 5.7SP2, member/resetpassword.php allows remote authenticated users to reset the passwords of arbitrary users via a modified id parameter, because the key parameter is not properly validated.
CVE-2019-10015
PUBLISHED: 2019-03-24
baigoStudio baigoSSO v3.0.1 allows remote attackers to execute arbitrary PHP code via the first form field of a configuration screen, because this code is written to the BG_SITE_NAME field in the opt_base.inc.php file.
CVE-2019-10017
PUBLISHED: 2019-03-24
CMS Made Simple 2.2.10 has XSS via the advanced_search.php Name field, which is reachable via an "Add a new Profile" action to the File Picker.
CVE-2019-10010
PUBLISHED: 2019-03-24
Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library before 0.18.3 allows remote attackers to insert unsafe links into HTML by using double-encoded HTML entities that are not properly escaped during rendering, a different vulnerability than CVE-2018-20583.
CVE-2019-9978
PUBLISHED: 2019-03-24
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.