Fifty-five individuals were charged with stealing millions of dollars from multiple financial institutions as part of a massive cyber fraud scheme.
The defendants are accused of stealing more than $2 million from US institutions Chase, TD Bank, Citibank, Discover and American Express.
As part of their scheme, the crime ring also stole the identities of at least 200 individuals and organisations.
The charges include conspiracy to commit grand larceny, grand larceny, criminal possession of stolen property, identity theft and criminal possession of a forged instrument.
Between May 2010 and September this year, the perpetrators allegedly relied on rogue insiders at banks and other businesses to steal the personal information, including Social Security numbers and financial account information, belonging to unsuspecting customers, prosecutors said.
Members of the conspiracy recruited employees from the nonprofit United Jewish Appeal-Federation, car dealership Open Road Audi of Brooklyn, residential property management company AKAM Associates and Chase Bank.
In particular, the hired hands at Chase accessed banking customers' accounts and helped conduct fraudulent transactions by ensuring they were not immediately detected by the bank's anti-fraud and anti-money laundering systems.
“Today's indictment reveals another tool of organised identity thieves – insiders who betray their employers and prey on clients,” Vance said.
“These insiders used their positions to gain access to client data, and then sold that data to make money for themselves and their accomplices.”
Those in the fraud ring had numerous jobs, including buyers who purchased the stolen information from rogue insiders and resold some of it to other criminals.
Others ordered credit reports of victims to learn more about them so they could answer security questions to open additional credit card accounts in their names.
Still others used the stolen data to create counterfeit checks, while some were tasked with depositing the checks into their bank accounts.
The indictments and arrests were the result of an 18-month investigation that included court-ordered eavesdropping, physical surveillance, computer forensics and analysis of credit card, banking and phone records.
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.