Feeds

Wi-Fi hopper guilty of cyber-extortion

Give me $17m. Or else

  • alert
  • submit to reddit

SANS - Survey on application security programs

A Maryland man with a grudge against a Connecticut-based patent firm used unsecured wireless networks at homes and businesses in the Washington DC area to penetrate the company's computers and deliver untraceable threats and extortion demands, until an FBI surveillance team caught him in the act.

Myron Tereshchuk, 42, pleaded guilty this month to a single charge of "attempted extortion affecting commerce" for demanding a $17m ransom in exchange for not broadcasting proprietary information he obtained from MicroPatent, LLC, an intellectual property firm that packages patent and trademark information for law firms.

Tereshchuk ran a small, competing patent document service that ran into trouble when he was allegedly caught removing files from US Patent and Trademark Office, and was temporarily banned from the facility. Tereshchuk believed he was the victim of corruption at the patent office, and blamed MicroPatent, according to court records. He began penetrating the company's computers, going through its trash, and pseudonymously sending harassing e-mails to its customers and president.

At one point, the company president tried to use a "Web bug" to trace his cyber tormenter, but Tereshchuk detected the ruse. Meanwhile, FBI agents traced some of the emails and intrusions to two homes and a dentist's office in Arlington, Virginia. The residents, and the dentist, made poor suspects, and the agents learned that all three were running unsecured 802.11b networks.

Though he went to some lengths to make himself untraceable technically, past altercations between Tereshchuk and the company made him the prime suspect from the start, according to court records. The clearest sign came when he issued the $17m extortion demand, and instructed the company to "make the check payable to Myron Tereshchuk."

The FBI began following Tereshchuk, and in March a surveillance team watched as he drove to a computer lab at the University of Maryland, where he used a purloined student account to send more threatening email. "During this drive he was observed driving erratically and was paying a lot of attention to something in the front passenger side seat," an FBI affidavit notes.

The Bureau got a search warrant for Tereshchuk's home, where they found evidence of his campaign against MicroPatent, as well as the components for hand grenades and the formula and ingredients necessary for making Ricin, according to prosecutors, who say the FBI is still investigating some aspects of the case. Tereshchuk is scheduled for sentencing on October 22nd.

Copyright © 2004, SecurityFocus logo

Related stories

Beware the rogue access points
US wardriver pleads guilty to Wi-Fi hacks
The Wi-Fi user as wireless felon
Michigan Wi-Fi hackers try to steal credit card details
Wi-Fi hacker caught downloading child porn
Wi-Fi whistle blower faces criminal charges

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.