Skip to main content

Identity Thief Gonzales Pleads Guilty

Albert_Gonzalez_HackerAlbert Gonzales has plead guilty to the theft of more than 170 million credit and debit card numbers from major U.S. retailers, in the last of three cases brought against him by federal prosecutors. Gonzales now faces up to 25 years in prison under the terms of previous plea agreements, and is scheduled to be sentences in March.

A 28-year-old college drop-out—and one-time federal informant—Gonzales was the orchestrator of the largest identity theft in U.S. history, targeting major U.S. retailers, often via credit card processing firms. The latest case related to Gonzales gaining illegal access to credit and debit card processing handled by Heartland Payment Systems, Inc., of New Jersey, as well as convenience store chain 7-Eleven, Maine-based supermarket chain Hannaford Brothers, and two other unnamed companies. Previous cases have involved Gonzales stealing payment information from TJX Cos., OfficeMax, BJ’s Wholesale Club, Barnes & Noble, and Sports Authority. Mega-retailer Target has also admitted to having a “limited” amount of customer payment data stolen by Gonzales.

Gonzales’s defense characterized the man as an “Internet addict” with poor social skills but an “idiot-savant-like genius” for information technology.

In 2003, Gonzales was arrested for computer hacking, but was never charged because he agreed to help the Secret Service find other hackers. While continuing to assist the federal government, Gonzales also worked on his illegal activities targeting retailers. Gonzales accumulated some $2.8 million, and lived lavishly, staying in upscale hotels, throwing large parties, and purchasing a Miami condominium and an BMW automobile. Under the plea agreement, Gonzales must forfeit all the fruits of his criminal enterprise.

Gonzales’s accomplices in the identity theft scheme remain at large.

Editors' Recommendations

Topics
Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
LastPass reveals how it got hacked — and it’s not good news
A depiction of a hacker breaking into a system via the use of code.

Last year was a particularly bad one for password manager LastPass, as a series of hacking incidents revealed some serious weaknesses in its supposedly rock-solid security. Now, we know exactly how those attacks went down -- and the facts are pretty breathtaking.

It all began in August 2022, when LastPass revealed that a threat actor had stolen the app’s source code. In a second, subsequent attack, the hacker combined this data with information found in a separate data breach, then exploited a weakness in a remote-access app used by LastPass employees. That allowed them to install a keylogger onto the computer of a senior engineer at the company.

Read more
This huge password manager exploit may never get fixed
A large monitor displaying a security hacking breach warning.

It’s been a bad few months for password managers -- albeit mostly just for LastPass. But after the revelations that LastPass had suffered a major breach, attention is now turning to open-source manager KeePass.

Accusations have been flying that a new vulnerability allows hackers to surreptitiously steal a user’s entire password database in unencrypted plaintext. That’s an incredibly serious claim, but KeePass’s developers are disputing it.

Read more
U.S. federal court system cyberattack is worse than previously thought
A large monitor displaying a security hacking breach warning.

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an “incredibly significant and sophisticated” attack.

This statement is a stark difference from the one initially provided when the situation occurred in 2020.

Read more