The fraud is to the tune of $50,000 and information of as many as 12,000 people who were patients at Montefiore Medical Center could be compromised.
A group of 49 cyber-criminals located in Italy, Spain, Poland, the United Kingdom, Belgium and Georgia were nabbed by the authorities in a joint international investigation.
From a total of 58 properties, authorities recovered and seized laptops, hard disks, telephones, tablets, credit cards and cash, SIM cards, memory sticks, forged documents and bank account documents.
The operation was headed by Europol's European Cybercrime Centre (EC3) and Eurojust, and was assisted by the Italian Polizia di Stato (Postal and Communications Police), the Spanish National Police, the Polish Police Central Bureau of Investigation, and supported by UK law enforcement bodies.
The arrested members are suspected of financial fraud to the tune of 6 million Euros. The group targeted medium and large European companies through malware and social engineering techniques.
The joint operation was coordinated from Europol's headquarters in The Hague.
The Cyber Crimes bureau of the Los Angeles Sheriff's Department is working closely with the school to investigate how the unauthorized access of the school network could have taken place.
"We are very confident that we have the ability to restore all of the impacted scores. Teachers have been contacted and will be reviewing their student's grades for accuracy," said Principal Michael Kelly.
This is not the first recent incident in California after a student of Dixon High School in north California was also arrested earlier for unauthorized access to his school network.
Students whose grades were changed were interviewed by the authorities and some of them were suspended while the grades of all are being reverted back.
The teachers will be reviewing the grades again to make sure that the original grade is given to each student.
A 25-year-old student, who hacked Birmingham University's computers to upgrade his marks, has been jailed for four years.
Imran Uddin, who was pursuing his final year in bio-science course at the University of Birmingham, increased his marks from 57 per cent to 73 per cent by stealing staffs passwords using a keyboard spying device.
According to the Birmingham Crown Court, in order to steal the staffs passwords, Uddin had attached a hardware keylogger at the back of computers.
The incident came into light on October 7 last year, when two staffs carried out a routine upgrade on a computer in the bio-science building.
The attached devices, which could record the key strokes of anyone, were found at the back of the computers when staff removed protective casing.
After that other computers of the University were checked where they found more such devices attached.
The court sent him to jail after he admitted six charges as per the Computer Misuse Act.
Judge James Burbidge QC told Uddin (The Telegraphreports), "For reasons not entirely clear to me, whether it was monetary, or pride or a desire to out-perform others, you decided to cheat and you formed a settled intention to do that. I consider your actions were planned and persistent.”
He added that this kind of conduct has the potential to undermine public confidence in the degree system, set up by this university.
“I have decided that I cannot pass a suspended sentence because there needs to be an element of deterrence," he said.
Madhu Rai, the prosecuting, said that the one of the devices was attached to a computer of Christine Chapman, a staff, who had access to the University grades.
Police found that Uddin had made ebay searches on his computer for keyboard cheating devices.
Balbir Singh, the defending, said that Uddin, who was the first person from his family to go to University, did so because of the pressure. He could not see clearly.
A spokeswoman for the Birmingham University said that they could not comment on individual cases, however, they took any criminal activity seriously and work closely with West Midlands Police.
Along with the legal sanctions, students, who convicted such crimes, face misconduct investigation and ultimately face permanent exclusion.
Hacking School's computer network and changing the Grade is not the right way to get good Grades
A 18-year-old Miami High School student was arrested after he allegedly hacking into the Miami-Dade Public Schools database to his grades and grades of four other students.
Jose Bautista, was charged with multiple counts including intellectual property offence and offense against computer users, after he reportedly gave Princiapal a written confession.
He was released on a $20,000 bond. Judge ordered him to place him under house arrest and wear a GPS tracking device.
"It's not fair to the people that really try," said Mayan Dehry, a senior student at the school."I don't know, if you're just going to be lazy and then change your grades, that's not what learning is about."
|Image Credits: Hanoimoi|
The suspects are identified as 23 year old Ha Xuan Tien, 24-year-old Nguyen Duc Luc, 25-year-old Nguyen Van Tu, 29-year-old Tran Ngoc Hai, according to Tuoitrenews.
The malicious applications which was used by suspects to infect users are said to be distributed via websites like "soundfest.com.vn", "clickdi.com".
Once the malicious application infects a smart phone, the app will automatically send SMS messages to premium rate numbers. Premium rate numbers allows the owner to earn money from incoming calls and SMS.
The victim will lose 15,000 Vietnamese Dong($0.71 in USD), after each message is sent from their device to these premium rate numbers.
Using this method, the cyber criminals manged to earn more than 2.1 Billion Vietnamese Dong($98,700 in USD) since late 2013.
The members of the criminal are Adjibola Akinlabi (aged 26), Damilare Oduwole (26), Michael Awosile (27), Nadine Windley (26) and Temitope Araoye (29) and a malware writer "Tyrone Ellis (27)".
The evidence gathered by authorities including phone and online chat records shows that they made more than £300,000 from their fraud scheme. However, the officers believe it could be much higher , possibly more than £1million ($1.6m).
According to the National Crime Agency report, the fraudsters targeted innocent job hunters with fake job ads. Those who responded to the ads were sent a link via email asking them to complete an application form. Once the user clicks the link , it inadvertently install malware in victim's system.
The malware is capable of recording keystrokes and capturing victim's financial and personal data.
The compromised information is used by the fraudsters to get a new credit and debit cards, pin numbers.
The crooks will remain in custody and expected to be sentenced on Thursday 14 November.
Cybercriminals have reportedly targeted the Salary accounts of Mumbai Police and managed to withdraw money from their account.
According to NDTV report, cybercriminals have managed to withdraw money from Axis bank accounts of at least 14 Policemen from ATMs in Greece.
It appears hackers in Greece have done this heist by cloning ATM cards of Policemen in Mumbai.
At this time, there is no further information about how much money has been withdrawn and how many policemen have been affected by this heist.
The Mumbai police has formed a team to investigate the hack and bank has been asked to investigate.
An Algerian man who is believed to be the creator of the infamous Banking Trojan "SpyEye" was extradited from Thailand to the United States to face charges.
Hamza Bendelladj, 24-year-old, also known as Bx1, will face charges for allegedly playing a role in developing, marketing ,distributing and controlling the SpyEye virus, according to FBI report.
SpyEye is a Banking Trojan(similar to Zeus virus) that steals confidential personal data and finance information such as online banking credentials , credit card information.
He was arrested at Suvarnabhumi Airport in Bangkok, Thailand, on Jan 5, while he was in transit from Malaysia to Egypt.
If convicted, he will face a maximum sentence of up to 30 years in prison for conspiracy to commit wire and bank fraud; up to 20 years for each wire fraud count; up to five years for conspiracy to commit computer fraud; up to five or 10 years for each count of computer fraud; and fines of up to $14 million.
Earlier this year, Hackers breached the Industrial Control System (ICS) network of a New Jersey air conditioning company by exploiting a backdoor vulnerability in the system, according to an FBI memo(info.publicintelligence.net/FBI-AntisecICS.pdf).
The hackers first breached the company’s ICS network by exploiting the vulnerabilities in Tridium Niagara ICS system , that allowed access to the main control mechanism for the company's internal heating, ventilation, and air conditioning (HVAC) units.
According to the memo, the security breach occurred in February and March 2012 , few weeks after @ntisec posted a tweet indicating that hackers were targeting SCADA, and something had to be done to address SCADA vulnerabilities.
The company used the Niagara system not only for its own HVAC system, but also installed it for customers, which included banking institutions and other commercial entities.
Although the controller for the system was password protected in general, the backdoor through the IP address apparently required no password and allowed direct access to the control system. The link posted by the hacktivist provided the same level of access to the company's control system as the password-protected administrator login.
The logs from controller showed hackers has gained access to the system from multiple unauthorized international and US-based IP addresses.