Due to the lapse in appropriations, Department of Justice websites will not be regularly updated. The Department’s essential law enforcement and national security functions will continue. Please refer to the Department of Justice’s contingency plan for more information.

You are here

Justice News

Department of Justice
U.S. Attorney’s Office
District of New Jersey

Friday, October 17, 2014

Massachusetts Man Gets 30 Months In Prison For Role In Multimillion-Dollar International Cybercrime Scheme

Worked as ‘Casher’ for Organization that Allegedly Capitalized on
Information Hacked From Customers of More Than a Dozen Global Financial Institutions

TRENTON, N.J. – A member of an alleged international cybercrime, identity theft and credit card fraud conspiracy was sentenced today to 30 months in prison for his role in a scheme to use information hacked from customer accounts at more than a dozen banks, brokerage firms, payroll processing companies and government agencies to attempt to steal $15 million from customers, U.S. Attorney Paul J. Fishman announced.

Lamar Taylor, 38, of Salem, Mass., previously pleaded guilty before U.S. District Judge Peter G. Sheridan to an information charging him with one count of conspiracy to commit wire fraud, access device fraud and identity theft. Judge Sheridan imposed the sentence today in Trenton federal court.

According to documents filed in the case and statements made in court:

Taylor was asked by other members of the conspiracy to participate in a scheme to “cash out” bank accounts and pre-paid debit cards opened in the names of others. Oleksiy Sharapka, 34, of Kiev, Ukraine, allegedly directed the conspiracy with the help of Leonid Yanovitsky, 39, also of Kiev. Oleg Pidtergerya, 50, who previously pleaded guilty to his role in the conspiracy, managed a cash-out crew in New York for Sharapka and Yanovitsky, and Robert Dubuc, 41, who has also pleaded guilty to his role in the conspiracy, controlled a cash-out crew in Massachusetts. Taylor worked as a “casher” under Dubuc.

Hackers first gained unauthorized access to the bank accounts of customers of more than a dozen global financial institutions and businesses, including: Aon Hewitt; Automatic Data Processing Inc.; Citibank N.A.; E-Trade; Electronic Payments Inc.; Fundtech Holdings LLC, iPayment Inc.; JP Morgan Chase Bank N.A.; Nordstrom Bank; PayPal; TD Ameritrade; U.S. Department of Defense, Defense Finance and Accounting Service; TIAA-CREF; USAA; and Veracity Payment Solutions Inc.

After obtaining unauthorized access to the bank accounts, Sharapka and Yanovitsky diverted money from them to bank accounts and pre-paid debit cards they controlled. They then implemented a sophisticated cash-out operation, employing crews of individuals, including Taylor, to withdraw the stolen funds by making ATM withdrawals and fraudulent purchases in New York, Massachusetts, Illinois, Georgia and elsewhere. Both Sharapka and Yanovitsky are under indictment in the United States and remain at large.

Taylor admitted he was aware fraudulent accounts and cards were created without the consent of the individuals in whose names they were opened. He admitted that they opened bank accounts in the names of identity theft victims and that those accounts were funded with money stolen by other conspirators. He also admitted conducting ATM and bank withdrawals of the stolen funds and providing the proceeds of the fraud, less their own fees, to immediate higher-ups in the organization – Pidtergerya and Dubuc, who, in turn, sent a portion of the proceeds to Sharapka and Yanovitsky in Ukraine.

The government’s ongoing investigation into the organization has so far identified attempts to defraud the victim companies and their customers of more than $15 million.

In addition to the prison term, Judge Sheridan sentenced Taylor to three years of supervised release and ordered him to pay restitution of $338,649.

U.S. Attorney Fishman credited the special agents of the U.S. Secret Service, under the direction of Special Agent in Charge James Mottola; U.S Immigration and Customs Enforcement, Homeland Security Investigations, under the direction of Special Agent in Charge Andrew M. McLees; Department of Defense, Defense Criminal Investigative Service, under the direction of Special Agent in Charge Jeffery D. Thorpe, Cyber Field Office; and IRS-Criminal Investigation, under the direction of Acting Special Agent in Charge Jonathan D. Larsen, with the investigation leading to today’s sentencing.

The government is represented by Economic Crimes Unit Chief Gurbir S. Grewal of the U.S. Attorney’s Office in Newark.

The charges and allegations concerning the remaining conspirators are merely allegations and they are presumed innocent unless and until proven guilty.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes. With more than 20 federal agencies, 94 U.S. Attorneys’ offices and state and local partners, it’s the broadest coalition of law enforcement, investigatory and regulatory agencies ever assembled to combat fraud. Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state and local authorities; addressing discrimination in the lending and financial markets and conducting outreach to the public, victims, financial institutions and other organizations. Over the past three fiscal years, the Justice Department has filed nearly 10,000 financial fraud cases against nearly 15,000 defendants including more than 2,900 mortgage fraud defendants. For more information on the task force, please visit www.stopfraud.gov.


Defense counsel: Bruce Rosen Esq., Florham Park, N.J.

Updated March 18, 2015