Tuesday, February 11, 2025
HomeIncident ResponseBrother and Sister Pleads Guilty for Stealing & Selling Hundreds of Laptops...

Brother and Sister Pleads Guilty for Stealing & Selling Hundreds of Laptops from University

Published on

SIEM as a Service

Follow Us on Google News

There is news regarding a brother and sister all over the internet, and the news is about theft. Both brother and sister have pleaded and also admitted that they have stolen and sold hundreds of very new MacBook from Stanford University worth millions of dollars.

According to the prosecutor, Patricia Castaneda, 37 years old, from San Carlos, California, has worked at the university’s School of Humanities and Sciences.

After interrogating her, she admitted that she was responsible for requesting replacement laptops for the organization and its staff, who were designated to a new one every three years.

However, Patricia has been continuously over-ordered and then sold them, and she was doing this from 2009. In six years, she commenced giving all the computers to her brother, Eric Castaneda, of 36 years old, from Redwood City.

Once Eric gets the computer from his sister, then he sold them to another man that they had met through a Craigslist ad; according to the report, that man lived in Folsom, California, who then exported them out of the US.

Stealing Millions Of Dollars Worth Of Computers

The report that has been prepared by the prosecutor clearly affirms that Castaneda was charged with defrauding a total of $4 million. Not only this, but there are nearly $2.3 million of stolen goods that were assigned to her brother. 

Moreover, the prosecutors obtained access to one of Eric’s texts after reading the whole conversation; the prosecutors stated that it clearly shows that they both were discussing the sale of laptops and codenamed “ingots” for a short while, and he is being continuously negotiating a price.

As per the authorities, all the computers were being sold on Craigslist and the authorities also said that craigslist was sold to an uncharged co-conspirator. 

After asking a hundred times, Eric admitted that it was a Folsom man who later resold all the computers to the people who were living in other states.

The authorities asserted that Patricia faces a peak of 10 years in jail, and she has to pay a fine of $250,000. At the same time, Eric is facing five years and a related fine of $250,000. 

Both brother and sister will be sentenced on June 7, but initially the report did not say that how the authorities have concluded that the university was Stanford, but later it confirmed all the details regarding the hundreds of laptops that were stolen for a long time.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pumakit – Sophisticated Linux Rootkit That Persist Even After Reboots

Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data

The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations....