Florida woman gets 2 year sentence for trafficking Microsoft software labels

A Florida woman has been sentenced to nearly two years in prison for trafficking in Microsoft software authentication labels and reselling the product keys extracted from them, U.S. prosecutors said Monday.

Heidi Richards, 52, was sentenced to 22 months in federal prison and ordered to pay a $50,000 fine, according to a statement from the U.S. Attorney’s Office.

Prosecutors said Richards operated an e-commerce business called Trinity Software Distribution and purchased tens of thousands of genuine Microsoft “certificate of authenticity” (COA) labels between July 2018 and January 2023 from a Texas-based supplier.

COA labels are stickers typically affixed to computers to verify that a copy of Microsoft software, such as Windows 10 or Microsoft Office, is genuine. They contain product key codes used to activate the software and include security features designed to deter counterfeiting.

Federal law prohibits selling those labels separately from the licensed software and hardware they are intended to accompany.

According to court documents, Richards and her co-conspirators paid millions of dollars for the labels at prices significantly below the retail value of the associated software. Instead of selling the labels with the corresponding software, Richards directed employees to manually extract the product key codes and record them in spreadsheets.

The license keys were then sold in bulk to customers worldwide. Between 2018 and 2023, Richards wired more than $5.1 million to the supplier, according to the indictment.

Prosecutors said the illicit resale of the keys exploited a secondary market for COA labels, which have no independent commercial value apart from the licenses and hardware they are meant to accompany.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Related Posts

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
Read More

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stack-based buffer overflow that could result in remote code
Read More

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate illegally harvested bank login credentials. Users to the website are
Read More