DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Romanian National Extradited To New Jersey To Face Charges In Computer Hacking Scheme

Posted on March 23, 2015 by Dissent

A Romanian citizen made his initial court appearance today following his extradition to face charges that he orchestrated an international hacking scheme targeting retailers, security companies, medical offices and individuals in the United States, U.S. Attorney Paul J. Fishman announced.

Mircea-Ilie Ispasoiu, 29, of Drobeta-Turnu Severin, Romania, is charged by federal indictment with two counts of wire fraud, two counts of unauthorized computer access to obtain information, two counts of unauthorized computer access that caused damage and three counts of aggravated identity theft. Ispasoiu was arrested Nov. 13, 2014, following an investigation led by the U.S. Secret Service and coordinated with Romanian law enforcement. The Court of Appeal of Bucharest granted extradition on Jan. 26, 2015, and Ispasoiu arrived in the United States on March 20, 2015. He appeared this afternoon before U.S. Magistrate Judge Michael A. Hammer in Newark federal court.

According to documents filed in this case and statements made in court:

From August 2011 through February 2014, Ispasoiu was employed as computer systems administrator at a large financial institution in Romania. Ispasoiu’s scheme allegedly involved hacking networks belonging to retailers, security companies, medical offices and individuals in order to steal user names and passwords, personal identifiers and credit and debit card data. For just one of the victims identified in the indictment, Ispasoiu was able to steal more than 10,000 credit and debit card numbers. Ispasoiu also gained access to a computer at a large security company that ran background checks on job applicants. Ispasoiu stole the applicants’ personal identifying information, including their fingerprints.

The maximum potential penalties for each count are as follows:

Count Violation Maximum Penalty
1 and 2 Wire fraud 30 years; $1 million fine or twice the gain or loss from the offense
3 and 4 Unauthorized computer access to obtain information Five years; $250,000 fine or twice the gain or loss from the offense
5 and 6 Unauthorized computer access that caused damage Five years; $250,000 fine or twice the gain or loss from the offense
7-11 Aggravated identity theft Mandatory two years (consecutive to any other imposed sentence); $250,000 fine or twice the gain or loss from the offense

U.S. Attorney Fishman credited the special agents of the U.S. Secret Service, Newark Field Office, under the direction of Acting Special Agent in Charge Carl Agnelli, with the investigation leading to the charges. U.S. Attorney Fishman also thanked the Justice Department’s Office of International Affairs in Washington, as well as the Prosecutor’s Office attached to the High Court of Cassation and Justice in Romania and its law enforcement partners, for their support.

The government is represented by Assistant U.S. Attorney Daniel Shapiro of the Computer Hacking and Intellectual Property Section of the Office’s Economic Crimes Unit.

The charges and allegations contained in the indictment are merely accusations, and the defendant is considered innocent unless and until proven guilty.

15-097

Defense counsel: Kevin Carlucci Esq., Assistant Federal Public Defender, Newark

Ispasoiu, Mircea-Ilie Indictment

SOURCE: U.S. Attorney’s Office, District of New Jersey

 

According to the indictment, which does not name the victim entities:

“Victim 1” was a restaurant in or around Montclair, New Jersey,

“Victim 2” was a car dealership in or around North Brunswick, New Jersey,

“Victim 3” was a large security firm operating throughout the United States, and

“Victim 4” was a medical office in or around Phoenix, Arizona.

So… anyone want to name the four victim entities?


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
Category: Business SectorHackHealth DataID TheftMalwareU.S.

Post navigation

← IE: Garda tells court Credit Union official showed his father his confidential financial statements
Ca: Cops called, but no charges in Service NL privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.