Mobile

10/27/2017
03:08 PM
50%
50%

Identity Theft Ring Hit with Credit Card Fraud Indictment

A federal grand jury indicts six individuals on criminal charges relating to credit card and debit card fraud.

A federal grand jury indicted six Americans for operating an identity theft ring designed to commit credit card and debit card fraud, the Department of Justice announced this week.

Travon Williams, 33, of Portsmouth, Va.; Rodriquez Norman, 29, of Temple Hills, Md.; Nathaneal Williams, 25, of Manassas, Va.; and Marvin Mitchell, 33, Gentle Grant Tyson III, 32, and Ebony Coe, 29, all of whom are from Virginia Beach, Va. were charged with three criminal counts.

The indictment encompassed conspiring to commit bank and wire fraud, conspiring to traffic in contraband cigarettes, and aggravated identity theft. The bank and wire fraud charges carry a potential maximum sentence of 30 years in prison, while the aggravated identity theft charges carry a potential mandatory term of two years in prison.

The ID theft ring allegedly purchased thousands of stolen credit card and debit card numbers and then encoded that information, along with identities belonging to real people, onto forged credit cards, the DOJ claims. With these cards, the group purchased valuable items, including cartons of cigarettes, which were then resold on the black market for $47 per carton, the DOJ states.

Read more about the ID theft ring here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14339
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
CVE-2018-14340
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
CVE-2018-14341
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
CVE-2018-14342
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
CVE-2018-14343
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.