Feeds

Bin Laden hackers denounce founder

In their own words

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Leet German script k1dd13 and would-be investment guru Kim Schmitz aka Kimble, who recently promoted his YIHAT (Young Intelligent Hackers Against Terrorism) Ninja force with loose claims to have hacked a Sudanese bank with /bin/laden accounts, has been denounced by two people claiming to be members of his organization.

We denounced him too a while back. Now two reputed compatriots have rounded on him as well, drawing heavily on an article published by The Standard in January 2001.

In their own words:



YIHAT, the group who was to take the money away from terrorists, caused a big controversy in our world today. Kimble was their mysterious leader. Directly from the inside of the group, I, Splices along with Demannu, tell you the truth of Kimble.

Kim Schmitz is an owner of Kimvestor which is not even registered company yet. For this reason and involvement with Netherlands online dealer Letsbuyit.com, the federation of the capital investors and German state attorney are preparing charges against Kim Schmitz for investment fraud. He's not reach as he appears to be. He sold 80% of his company Data Protect which is Security Company and had until recently about 15 employees.

Most of his money he spend on expensive penthouse in Munich, cars, yacht and expensive trips to Monte Carlo, Caribbean sea and women. His other two companies, Monkeybank and Megacar are only paper tigers, loosing money. Secondly, his is not a hacker. He is banned from the German hacker scene, because he betrayed the hackers who worked with him on credit and calling card fraud. (The reason why he got only six months) Do you know his ten rules? One says: Don't talk too much, obviously not good enough for your Kimble; he's known as biggest mouth of Germany. Why do you think there's almost nothing about business on his website but over 300 pictures of him, not to mention silly flash movies.

Hacker? Yes of course. Bellow you can read what Boris Gröndahl (journalist working for Standard) found out: Kim Schmitz, doesn't make a secret of his past alias of "Kimble", the convicted computer hacker. On the contrary, he makes this one of his selling points. This may appear honest at first glance, but if you compare what stunts he lays claim to, and what his court verdict in 1998 found him guilty of, his past looks a bit less glamorous. However, Schmitz's claims follow a pattern. He takes bits of what he has been found guilty of, bits of other hackers' publicized doings, even tales of hacker movies, and mixes them together to form his "personae".

MYTH: Many papers reported that Schmitz lowered the credit rating of former German chancellor Helmut Kohl to zero.

TRUTH: Credit ratings on individuals in Germany are different from the US. There is no rating of a kind that you could "lower to zero". And the court verdict against Schmitz has nothing to say about this.

THE LINK: According to Schmitz's verdict, he had broken into the computers of the Deutscher Beamtenbund, a public officials' union, and among other documents, copied the union's correspondence with the chancellor. The Masters of Deception, a New York hacker group, lowered the credit rating of cyber-celebrity John Perry Barlow to zero during an online discussion in the early 1990s.

MYTH: Schmitz told the Sunday Telegraph he "got into Citibank's system and transferred $20 million by taking tiny amounts from the accounts of 4 million customers and giving it to Greenpeace".

TRUTH: Nothing like this is in the court records. In fact, there's no link to Citibank or Greenpeace at all. A Greenpeace spokeswoman told The Standard Europe the claim was "just not true", adding that $20 million would have been half the organization's annual budget in the mid-1990s.

THE LINK: In a widely publicized case in 1996, Citibank did indeed fall victim to a group of Russian hackers who caused $10 million in damages. The money didn't go to Greenpeace, though. However, the final scene in the hacker movie "Sneakers" (featuring Robert Redford, Dan Aykroyd and Sidney Poitier) is a TV news speaker announcing that the Republican Party had to declare insolvency while Greenpeace announces an enormous anonymous donation.

MYTH: Schmitz also told the Sunday Telegraph that "he developed the Blue Box, software that would override the phone charging system".

TRUTH: According to the court papers, Schmitz didn't use clever software to "override the phone charging system", but simply stolen calling card numbers he had bought from US hackers.

THE LINK: Blue Box is the name for a hardware device which cheated the phone charging system by simulating its signals. They were widely used in the US, years before Schmitz was born in 1974.

MYTH: In the prospectus of his company Kimvestor, Schmitz claims to have broken into NASA and the Pentagon.

TRUTH: Nothing like this in on the records. The spokesman of the German hacker organization Chaos Computer Club dismisses his claims as "made up".

THE LINK: The hacking into a wide array of computers including those of the NASA made the Chaos Computer Club world-known in 1988. Some of the hackers who had done this were hired by the Soviet intelligence service KGB and broke into computers of military research labs in the US, but not into the Pentagon.

MYTH: Schmitz told the Sunday Telegraph "when he came out of prison he was inundated with offers from companies... Within a week he was working for Lufthansa".

TRUTH: According to his verdict, Schmitz was breaking into systems and used what he found to offer those firms his advice in security matters through an accomplice's consultancy. The accomplice was a former Lufthansa employee and Lufthansa was among their victims. However, the court states that it wasn't Schmitz who broke into Lufthansa's network but another accomplice.

P.S., US Patent and Trademark Office does not have any records on Monkey nor Magacar technology as Kim Schmitz is claiming on his website nor any other patent registered under his name nor names of Kimvestor, Data Protect, Megacar or Monkey AG."

Kimble was a fraud and is a fraud. In fact, call him at +49-172.444.4444, and tell him how you feel. I and Demannu were very devoted to his cause and he lead us into nothing, and in light of everything the very spirited ones who were the brains behind everything have compiled something new to take YIHAT's place. Don't get us wrong -- we are totally different.

Meet ECHO. This is who we are: We are a research group made up of Security Parishioners, Programmers, Mathematicians, and Security Researchists that cover areas from software flaws to encryption and even ranging from viruses and Trojans - we haven't a limit. We will eventually form a security firm, and sell our own line of software that will be aimed toward security. I can't place a limit on our expansiveness - our entrepreneurial eye has released something BIG. Our goals lie to secure the internet in an entire new way not seen before. I am not at liberty at this time to release our ideas, but we will revolutionize the way security is handled among the internet - and prove it.

We are open to all criticism and expect it, but all criticism will be accepted as constructive criticism. We don't wear batman capes and we don't chase terrorists and have suckers in our mouth. We research security and will bring a new light to the Internet.

Related Story

Bin Laden hack-meister in defacement, financial debacles

Secure remote control for conventional and virtual desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.