Filipino in Florida admits int’l credit card and bank fraud

SAN FRANCISCO – A Filipino national confessed to running an international cashing operation that monetized stolen credit and debit card information obtained through computer hacking and ATM skimming operations, New Jersey U.S. Attorney Paul J. Fishman announced.
Angelo Virtucio, a/k/a “ZaiR,” a/k/a “ZaiRe,” a/k/a “Omega,” a/k/a “Omega10,” 30, of Quezon City, Philippines, pleaded guilty before U.S. District Judge Susan D. Wigenton in Newark federal court to an information charging him with one count of conspiracy to commit bank fraud.
Virtucio was arrested in the Southern District of Florida on January 29, 2015 and was extradited to the District of New Jersey on February 11, 2015.

According to documents filed in this case and statements made in court, Virtucio monetized millions from stolen credit and debit card data using a global network of “cashers” that he employed to enter into unauthorized financial transactions using stolen account information.
The stolen credit card data was primarily obtained through computer hacking. The stolen debit card data was mostly obtained through ATM skimming operations. After purchasing the stolen data from other cybercriminals, Virtucio and his conspirators encoded it onto counterfeit credit and debit cards. The cashers then used the counterfeit cards to make unauthorized ATM withdrawals and purchases at physical retail locations.
The conspiracy to commit bank fraud charge is punishable by a potential maximum of 30 years in prison and a $1 million fine. Sentencing is scheduled for Oct. 24, 2016.
U.S. Attorney Fishman credited the special agents of the U.S. Secret Service, Newark Division, under the direction of Special Agent in Charge Mark McKevitt, with the ongoing investigation.
The government is represented by Assistant U.S. Attorney Andrew S. Pak of the Computer Hacking and Intellectual Property Section of the Economic Crimes Unit. Virtucio’s defense counsel: Kathleen Theurer Esq. and A. Paul Condon Esq.


. . . . . . . .

Leave a Reply