DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: Private Investigators Indicted for Hacking the Computers of People Opposing Their Clients in Civil Suits

Posted on February 11, 2015 by Dissent
SAN JOSE –  Nathan Moser, Peter Siragusa, AKA Bobby Russo, Carlo Pacileo, Trent Williams, and Sumit Gupta, AKA Sumit Vishnoi, were charged with crimes related to a conspiracy to access the e-mail accounts, Skype accounts, and computers of people opposing Moser’s and Siragua’s clients’ in civil lawsuits. The indictment was announced today after it was unsealed in court yesterday.
 
A federal grand jury indicted the defendants on January 15, 2015, charging them with one count of Conspiracy, in violation of 18 U.S.C. § 1030(b), six counts of Accessing a Protected Computer and Obtaining Information, in violation of 18 U.S.C. § 1030(a)(2)(C), and two counts of Interception of Electronic Communications, in violation of 18 U.S.C. § 2511(1)(a). The indictment was unsealed in court in San Jose, Calif., yesterday. 
 
According to the Indictment, Moser was a private investigator and owner of Moser and Associates in Menlo Park. Siragusa was also a private investigator and owner of Siragusa Investigations in Novato. Although Moser and Siragusa operated separate businesses, they often assisted in each other’s investigations. The Indictment further alleges that Williams and Gupta were computer hackers hired by Moser and Siragusa to access the e-mail accounts, Skype accounts, and protected computers of individuals without authorization. Pacileo was the director of security for ViSalus, a network marketing company based in Los Angeles and one of Moser’s clients.
 
The Indictment alleges that the object of the defendants’ conspiracy was to obtain information that would assist Moser’s and Siragusa’s clients, including Pacileo, in the clients’ lawsuits. According to the indictment, once retained by a client, Moser and Siragusa would hire Williams and Gupta, among others, to hack into the victims’ e-mail accounts, Skype accounts, and protected computers. In addition to that conduct, the defendants allegedly installed and used a keylogger—a tool that intercepts and logs the particular keys struck on a keyboard in a covert manner so that the person using the keyboard is unaware that his or her actions are being monitored—to obtain information that would assist Moser’s and Siragusa’s clients.
 
According to the Indictment, Ocean Avenue, a network marketing company based in South Jordan, Utah, was a competitor of ViSalus that had hired several former ViSalus employees. As a result, ViSalus initiated a civil lawsuit against Ocean Avenue employees. Pacileo hired Moser to investigate Ocean Avenue.  Moser allegedly enlisted Siragusa to assist with the investigation, and together they hired hackers to illegally obtain information to assist in the lawsuit.
 
An arrest warrant has been issued by the court for Gupta, who is believed to be in India. FBI Agents in San Jose are working with the FBI office in New Delhi, India, to secure Gupta’s prosecution.  
 
Further Information:
            Case #: CR-15-00013 – EJD (PSG)
                                                
           
SOURCE: U.S. Attorney’s Office, Northern District of California
 

Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
Category: Business SectorHackU.S.

Post navigation

← Is It Time for a Wall of Shame for the Education Sector?
FL: Two Pensacola Men Sentenced to Federal Prison for Tax Refund Fraud and Identity Theft Scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.