Skip to main content

Hackers stole $1.5 million using credit card data bought on the dark web

In what sounds like a movie script, over $1 million was stolen by a group that made use of thousands of credit cards posted for sale on the dark web. Some of the details of this complex cybercrime operation have come to light following an indictment by the U.S. Department of Justice.

In the United States v. Trevor Osagie, the defendant has pled guilty to conspiracy to commit credit card fraud from 2015 to 2018. Osagie worked with a network of thieves and managed to rack up over $1.5 million in damages.

At least 4,000 people were affected. As noted by Bleeping Computer, Osagie faces up to 30 years in prison and a fine of $1 million dollars. The sentencing is set for May 25, 2023.

The dark web is made up of internet content and services that aren’t accessible through normal means, and the websites and services provided are not indexed by major search engines. While the dark web isn’t always associated with illegal activities, its encrypted and anonymous nature makes it attractive to criminals.

By using the dark web, Osagie was able to recruit and manage other co-conspirators, who played various roles in the fraud. Hamilton Eromosele allegedly led the criminal network that used social media to recruit “workers” to purchase luxury items and gift cards with stolen credit cards.

From there, Ismael Aidara created fraudulent bank accounts and credit cards, while Malik Ajala provided the stolen card information. Six other people were involved in this saga, making trips to the U.S. for any task that required a physical presence. The case against them must have been strong because everyone named in the indictment entered guilty pleas.

Here’s how it worked. After this criminal network acquired stolen credit and debit card numbers from the dark web, the information was passed to members that would use this information to purchase flights to the U.S., rental cars, and accommodations. Continuing the spending spree, gift cards and luxury goods would be purchased.

The “workers” who traveled and purchased items for other members of the group were found on social media with promises of big profits and travel. The proceeds were divided up among the criminal network. After a wild, three-year rampage, the authorities were able to catch up and nab the wrongdoers.

Editors' Recommendations

Alan Truly
Computing Writer
Alan is a Computing Writer living in Nova Scotia, Canada. A tech-enthusiast since his youth, Alan stays current on what is…
How to do hanging indent on Google Docs
Google Docs in Firefox on a MacBook.

The hanging indent is a classic staple of word processing software. One such platform is Google Docs, which is completely free to start using. Google Docs is packed with all kinds of features and settings, to the point where some of its more basic capabilities are overlooked. Sure, there are plenty of interface elements you may never use, but something as useful as the hanging indent option should receive some kind of limelight.

Read more
How to disable VBS in Windows 11 to improve gaming
Highlighting VBS is disabled in Windows 11.

Windows 11's Virtualization Based Security features have been shown to have some impact on gaming performance — even if it isn't drastic. While you will be putting your system more at risk, if you're looking to min-max your gaming PC's performance, you can always disable it. Just follow the steps below to disable VBS in a few quick clicks.

Plus, later in this guide, we discuss if disabling VBS is really worth it, what you'd be losing if you choose to disable it, and other options for boosting your PCs gaming performance that don't necessarily involve messing with VBS.

Read more
How to do a hanging indent in Microsoft Word
A person typing on a keyboard, connected to a Pixel Tablet.

Microsoft Word is one of the most feature-rich word processing tools gifted to us human beings. In fact, the very word “Word” has invaded nomenclature to the point where any discussion of this type of software, regardless of what the product is actually called, typically results in at least one person calling the software “Word.”

Read more