Estonian hacker sentenced for Dave and Buster's card theft

Share this article:

A member of hacking ring that embarked on a daring cyber crime spree from 2005 to 2008 has been sentenced to seven years in prison, federal prosecutors announced Wednesday.

Aleksandr Suvorov, 28, of Estonia admitted in May 2009 that he had helped infiltrate computer networks run by the Dave & Buster's restaurant chain, from which hackers stole roughly 80,000 credit and debit card numbers at 11 locations.

He pleaded guilty to charges of wire fraud conspiracy, and in 2011, he also acknowledged in court that he sold an undercover U.S. Secret Service agent 160,000 stolen card numbers. The two cases were consolidated. He was sentenced in federal court in Long Island, N.Y.

Prosecutors said Suvorov and two co-conspirators, Albert Gonzalez and Maksym Yastremskiy, masterminded the Dave & Buster's plot.

The break-in was part of a global operation that used "sniffer" software to steal tens of millions of credit and debit cards from a slew of other retailers, including Hannaford Bros. grocery chain, Heartland Payment Systems, the TJX retail chain, BJ's Wholesale Club, OfficeMax, Boston Market, 7-Eleven, JCPenney, Barnes & Noble, Sports Authority and Forever 21.

The ringleader, Gonzalez, was sentenced in 2010 to 20 years in prison. A year earlier, a Turkish judge ordered Yastremskiy, a Ukrainian, to spend 30 years behind bars.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.