Feeds

bin Laden hackmeister ‘flees’ Germany

Auf Wiedersehen, prat

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Updated German glam-hax0r Kim Schmitz (aka Kimble), the founder of a group which made unsubstantiated claims to have hacked a Sudanese bank with /bin/laden accounts, has fled the country in fear of his life.

At least that's what the man himself would have us believe from a farewell letter on his site which shows, if nothing else, that Kimble is not afraid to sing his own praises.

The "500-million-mark" man, "super brain" and "Internet entrepreneur" was wrongly made out to be a "braggart" and "fraud" by people out to destroy his vision, he would have us believe. The authorities are unable to protect him against kidnap or death threats so he's decided to take his ego elsewhere.

There's no mention of reported financial problems and, sadly, Kimble's site has also been stripped of pictures of him and his mates flying in private jets to exotic locations with a bevvy of busty strumpets.

It's not clear what his plans are or where Schmitz is at the moment, and he's proving difficult to track down.

CNN reports that the German finance community, and Letsbuyit.com which he reportedly helped by offering to invest $40 million early last year when it was close to collapse, are unfazed by Schmitz's exile.

The hacking community will be hopeful that he's disappeared for good. Schmitz's self-created legend of hacking proficiency, based on a little fact combined with tasty bits from media interviews and movies, as this article makes all too clear, raised hackles in the community.

After the September 11 attacks, Schmitz claimed to have created an elite squad of cyber ninjas called YIHAT (Young Intelligent Hackers Against Terrorism) whose goal was "eliminating the electronic foundations of terrorist activities worldwide".

Last October Schmitz claimed that his YIHAT guard had obtained data on accounts held by members of Al Qaeda, including bin Laden, held at the AlShamal Islamic Bank in Sudan, but he offered not one shred of proof.

Days later Yihat was re-christened Young IDIOTIC haxOrz and Terrorists after an attack on its kill.net Web site by infamous hacker Fluffy Bunny.

Which say's it all really. ®

Update

Since we last looked, Schmitz has put up a fake headstone on his site announcing his death on Monday, which will be his 28th birthday. He's even put up a countdown clock and invited people to see his "death" live on the site. Really is there no end to this man's posturing?

A story in today's Der Spigel suggests Schmitz has been arrested in Thailand. Here's a translation from the original German, with thanks to all the readers who submitted it:

The End of the Road

Kim Schmitz Arrested in Thailand

Whatever he planned next, it will never materialise: Kim "Kimble" Schmitz has been arrested in Thailand. The 'King of the Hackers' has been accused of insider dealing, by which he allegedly made 1.5 million euros.

Munich computer expert Schmitz, sought internationally for his fraudulent insider dealing, was apprehended in Bangkok. The public prosecutor from Munich I confirmed on Friday a report to that effect by 'Teleboerse Online'. The 27 year-old was accused of using insider knowledge to buy shares for 375,000 euros, then selling them off shortly afterwards for 1.5 million euros.

Now we must wait to see how this develops, and when the accused will be handed over to Germany, said a representative of the public prosecutor's office. On the advice of the state supervisory office for bond trading, the Munich authorities have initiated inquiries and obtained the arrest warrant through Munich's law courts.

Schmitz is regarded as an enigmatic figure. He became known in Munich as a computer hacker and later sold his knowledge of security holes to companies.

Even now he is still ensuring sensation with one of his abstruse publicity tricks: on his Web site he is advertising his suicide on Monday - or at least his crossing "to a new world".

External links

Parting greeting from Kim Schmitz (in German and English)

Related stories

bin Laden hackers denounce founder
bin Laden hack-meister in defacement, financial debacles
Tables turns on Bin Laden 'bank crackers'
We've cracked into bin Laden's bank - UK hackers
Kimble.org offers $10m reward for arrest of bin Laden
Letsbuyit awakes from coma

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.