Hacking ring’s targets

Businesses targeted from 2005 to 2012 by an international hacking ring that stole more than 160 million credit and debit card numbers:

7-Eleven Inc.

Carrefour S.A., French multinational retailer

Commidea Ltd., European provider of electronic payment processing

Dexia Bank Belgium

Discover Financial Services Inc., issuer of Discover Card

Dow Jones Inc., publisher of news, business and financial information

Euronet, global provider of electronic payment processing

Global Payment Systems, one of world’s largest electronic transaction processing companies

Hannaford Brothers Co., supermarket chain

Heartland Payment Systems Inc., one of world’s largest credit and debit card payment processing companies

Ingenicard US Inc., provider of international electronic cash cards

J.C. Penney Co.

JetBlue Airways

Leading Abu Dhabi bank, identified only as “Bank A”

Nasdaq, the largest U.S. electronic stock exchange

Visa Inc., manager of the Visa brand

Wet Seal Inc., retailer

— Associated Press

Four Russian nationals and a Ukrainian have been charged with running a sophisticated hacking organization that penetrated computer networks of more than a dozen major American and international corporations over seven years, stealing and selling at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars.

Indictments were announced Thursday in Newark, where U.S. Attorney Paul Fishman called the case the largest hacking and data breach scheme ever prosecuted in the United States.

Princeton-based Heartland Payment Systems Inc., which processes credit and debit cards for small to mid-sized businesses, was identified as taking the biggest hit in a scheme starting in 2007 — the theft of more than 130 million card numbers at a loss of about $200 million.

Atlanta-based Global Payment Systems, another major payment processing company, had nearly 1 million card numbers stolen, with losses of nearly $93 million, prosecutors said.

The indictment did not put a loss figure on the thefts at some other major corporations, including Commidea Ltd., a European provider of electronic payment processing for retailers. The government said hackers in 2008 covertly removed about 30 million card numbers from its computer network.

About 800,000 card numbers were stolen in an attack on the Visa network, but the indictment did not cite any loss figure.

Not all the companies the hackers infected over the years with malicious computer software suffered financial losses. Customer log-in credentials were stolen from Nasdaq and Dow Jones Inc., the indictment said, though prosecutors said Nasdaq’s securities trading platform was not affected.

The indictment said the suspects sent each other instant messages as they took control of the corporate data, telling each other, for instance: “NASDAQ is owned.” At least one man told others that he used Google news alerts to learn whether his hacks had been discovered, according to the court filing.

The defendants were identified as Vladimir Drinkman, 32, of Syktyvkar, Russia, and Moscow; Aleksander Kalinin, 26, of St. Petersburg, Russia; Roman Kotov, 32, of Moscow; Dmitriy Smilianets, 29, of Moscow; and Mikhail Rytikov, 26, of Odessa, Ukraine.

Smilianets is in U.S. custody and was expected to appear in federal court next week. His New York-based lawyer, Bruce Provda, said Smilianets was in the U.S. “sightseeing” when he was arrested. “It’s a rather complex international charge of hacking,” Provda said. “If it goes to trial, it’s going to be a lengthy trial.”

Drinkman is being held in the Netherlands pending extradition, prosecutors said. His lawyer there, Bart Stapert, did not immediately return a message. The other three defendants remained at large.

The prosecution builds on the 2009 case that resulted in a 20-year prison sentence for Albert Gonzalez of Miami, who often used the screen name “soupnazi” and is identified in the new complaint as an unindicted co-conspirator. Other unindicted co-conspirators were also named. In the Gonzalez case, which focused on the theft from Heartland — at the time the biggest breach of its kind ever discovered in the U.S. — Kalinin and Drinkman were charged as “Hacker 1” and “Hacker 2.”

Prosecutors identified the two as sophisticated hackers who specialized in penetrating the computer networks of multinational corporations, financial institutions and payment processors.

Kotov’s specialty was harvesting data from the networks after they had been penetrated, and Rytikov provided anonymous web-hosting services that were used to hack into computer networks and covertly remove data, the indictment said.

Smilianets was the information salesman, the government said.

[ STORY CAN END HERE. ]

All five are charged with taking part in a computer hacking conspiracy and conspiracy to commit wire fraud. The four Russian nationals are also charged with multiple counts of unauthorized computer access and wire fraud.

The individuals who purchased the credit and debit card numbers and associated data from the hacking organization resold them through online forums or directly to others known as “cashers,” the indictment said. According to the indictment, U.S. credit card numbers sold for about $10 each; Canadian numbers were $15 and better-encrypted European ones $50.

The data was stored on computer servers all over the world, including in New Jersey, Pennsylvania, California, Illinois, Latvia, the Netherlands, Bahamas, Ukraine, Panama and Germany.

The cashers would encode the information onto the magnetic strips of blank plastic cards and cash out the value, by either withdrawing money from ATMs in the case of debit cards, or running up charges and purchasing goods in the case of credit cards.