'Iceman' Hacker Indicted For Running Identity Theft Scheme - InformationWeek
IoT
IoT
Software // Information Management
News
9/11/2007
04:14 PM
50%
50%
RELATED EVENTS
[Cybersecurity] Costs, Risks, & Benefits
Feb 28, 2017
How much should your organization spend on information security? What's the potential cost of a ma ...Read More>>

'Iceman' Hacker Indicted For Running Identity Theft Scheme

A San Francisco man faces 40 years in prison and a fine of $1,500,000 for allegedly hacking into financial institutions to steal credit card information.

A California man was indicted by a grand jury Tuesday for allegedly running an online identity theft scheme that nabbed "tens of thousands" of credit card numbers.

Max Ray Butler, 35, of San Francisco, was arrested in San Francisco on Sept. 5 on a criminal complaint filed in Pittsburgh. Tuesday's indictment leveled wire fraud and identity theft charges at him that carry a maximum of 40 years in prison and a fine of $1,500,000.

Butler, who also is allegedly known as names such as Iceman, Digits, Darkest, and Aphex, has been involved in what the government claims is a "large-scale criminal enterprise" focused on hacking into computer networks to steal and use or resell credit card and other personal information. In a 16-month investigation run by the U.S. Secret Service, investigators allegedly tied Butler to the Cardersmarket Web site, which he allegedly ran to help cohorts steal information and turn it into usable credit cards, according to the affidavit.

One co-conspirator told investigators he had received "tens of thousands" of illegally obtained credit card numbers from Butler, and regularly 1,000 or more numbers a month, according to the affidavit.

In May of 2001, Butler was convicted in federal court for intentionally accessing a protected government computer within the Department of Defense. In that case, he admitted to developing a program for the DoD that surreptitiously contained a backdoor that he used to gain access to the government network. He served a sentence at the Taft Federal Correctional Institute for that crime.

In this case, investigators reported that they recorded Butler communicating with two confidential informants who were members of Cardersmarket. They generally used private online chat rooms or communicated over AOL's Instant Messaging program.

According to the affidavit, Butler allegedly told one co-conspirator to buy 23 credit card accounts for $480. The information included account numbers, expiration dates, types of card, and issuing banks. The payment was made using an eGold account.

Once the conspirators had the credit card information, they allegedly either sold it or used it to manufacture fraudulent cards that they then used to make in-store purchases. Investigators said the products were then sold on one of their eBay accounts.

Two men reportedly said in an interview with the FBI that they saw Butler attack computer networks through a wireless Internet access point, stealing credit card numbers and personal identification information. The two allegedly worked with Butler, renting hotel rooms for four days at a time to use a high-powered antenna, which was used to intercept wireless communications.

One man told the FBI that they had hacked into Citibank, the Pentagon Federal Credit Union, and a government employee's computer.

The affidavit also states that members of Butler's group went so far as to rent apartments for him and help him obtain fake identities. In return, Butler reportedly had notorious computer hacker Kevin Mitnick sign a book as a gift for one of his cohorts.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll