Feeds

IT manager, turned cracker, jailed for five months

'Payback' attack on former employers

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

An IT manager was sentenced this week to five months imprisonment over a January 2003 hacking attack against his former employers, Santa Clara-based Manufacturing Electronic Sales Corporation (MESC).

Mark Erfurt, 39, from Orange County, southern California, was also ordered to pay $45,000 in compensation to MESC by US District Court Judge James Ware at a hearing in a San Jose federal court on Monday 14 March. Upon his release in prison, Erfurt will have to spend five months under house arrest and three years on probation.

Erfurt pleaded guilty to gaining "unauthorized access and recklessly damaging" the computer system of MESC as part of an August 2004 plea bargaining agreement. He also confessed to obstructing justice over his attempts to destroy evidence of his cyber crimes, which included downloading a proprietary database, reading the email account of MESC's president and deleting data from its servers.

Erfurt admitted he hacked into MESC's systems using the systems of a competitor, Centaur, who were employing him at the time and where he continues to work. Centaur Chief Executive Officer Bruce Cahill told IDG: "This was a private individual that happened to use a computer system at our office. We're not involved in this."

MESC, a hi-tech manufacturer's representative, went out of business in June 2004, employed Erfurt as a contractor, managing its network remotely part-time whilst he retained his main job with its Irvine-based rivals Centaur. This unusual arrangement reportedly soured over time, prompting Erfurt to attack MESC as "payback". ®

Related stories

Sacked sysadmin arrested on hacking charges
US super-pirates plead guilty
MP pitches Denial of Service law to Parliament

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.