SEC brings case against pump-and-dump spammers

Posted by   Virus Bulletin on   Jul 11, 2007

Scam spotted after spammed mail sent to SEC lawyer.

Two men from Texas have been charged with a range of spam and fraud offences after a 20-month campaign using botnets to spam pump-and-dump mails aimed at pushing up the price of a range of 'penny' stocks. Their scam came to the attention of the US Securities and Exchange Commission (SEC), who have brought the case against them, after a spam pushing the stocks was received by a lawyer working for the Commission.

The two, 40-year-old Darrel Uselton and his 69-year-old uncle Jack Uselton, are described by the SEC as 'recidivist securities law violators', and allegedly used zombie networks to send out spam promoting stocks in at least 13 companies, swindling gullible recipients out of over $4.6 million in investments. $4.2 million of this has already been seized from accounts linked to the two men.

The SEC froze several of the 'scalped' stocks in March after noticing suspect activity, and vow to continue to punish perpetrators of such scams. Full details of the charges brought, which include money laundering and organised crime charges brought by Texas state and local law enforcement bodies, are in a release from the SEC here.

Posted on 11 July 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.