Man Found Guilty of Targeting AOL Customers in Phishing Scam

thumbnail Man Found Guilty of Targeting AOL Customers in Phishing Scam

A 45-year-old California man convicted Jan. 12 of operating a sophisticated phishing scheme designed to steal personal and credit card information faces 101 years in prison. Jeffrey Brett Goodin of Azusa became the first defendant convicted by a jury under the provisions of the CAN-SPAM Act of 2003, announced prosecutors in the U.S. Attorney’s Office […]

Written By: Brian Prince
Jan 17, 2007
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A 45-year-old California man convicted Jan. 12 of operating a sophisticated phishing scheme designed to steal personal and credit card information faces 101 years in prison.

Jeffrey Brett Goodin of Azusa became the first defendant convicted by a jury under the provisions of the CAN-SPAM Act of 2003, announced prosecutors in the U.S. Attorney’s Office in the Central District of California. He was found guilty of sending thousands of e-mails to America Online users under the guise of messages from AOL’s billing department that prompted customers to send personal and credit card information. He then used the information to make unauthorized purchases, officials said.

“Money mules” play a big part in phishing. Click here to read more.

Prosecutors argued during the weeklong trial that Goodin used several compromised Earthlink accounts to send the e-mails to AOL users. Those e-messages urged recipients to “update” their AOL billing information before they lost service and referred the AOL customers to one of several Web pages to input their personal and credit information, officials said.

Goodin controlled those Web pages and used the information so he and others could make unauthorized charges on the AOL users’ credit or debit cards.

In addition to the CAN-SPAM Act conviction, Goodin was convicted of 10 other counts, including wire fraud, aiding and abetting the unauthorized use of an access device (credit card), possession of more than 15 unauthorized access devices, misuse of the AOL trademark, attempted witness harassment, and failure to appear in court, officials said.

He is scheduled to be sentenced by United States District Court Judge Christina Snyder on June 11, officials said.

Check out eWEEK.com’s Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraine’s eWEEK Security Watch blog.

Recommended for you...

Video: How Scale Computing and Velasea Power 6,000+ Surveillance Cameras at Resorts World Las Vegas

Discover how Scale Computing and Velasea are transforming physical security with hyperconverged infrastructure powering 6,000+ cameras at Resorts World Las Vegas.

Katie Bavoso
Jul 25, 2025
Video: How Simply NUC and Scale Computing Are Powering the Edge with Future-Proofed Hardware

Discover how Simply NUC and Scale Computing are powering innovation at the edge with future-ready hardware and virtualization software.

Katie Bavoso
Jul 23, 2025
Video: Breaking Down the new ThinkEdge SE100 from Lenovo and Scale Computing

Discover how Lenovo and Scale Computing are partnering to deliver hyperconverged, AI-ready edge solutions that drive innovation across retail, manufacturing, education and more.

Katie Bavoso
Jul 22, 2025
Video: Q2 2025 Channel Insights and Trends with the Channel Insider Editorial Team

A fast-paced editorial recap of Q2 2025 in the IT channel covering leadership shakeups at Kaseya, layoffs at Intel, federal obstacles pausing major acquisitions, AI adoption slowdowns, quantum security threats, evolving partner programs, and global economic tensions.

Katie Bavoso
Jul 17, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.