Feeds

Man charged over P2P ID theft scam

$oulseek

Beginner's guide to SSL certificates

Police have arrested a Seattle man over allegations he used P2P networks to swipe sensitive financial data from the PCs of file sharing fans.

Gregory Kopiloff, 35, allegedly used the Limewire and Soulseek P2P networks as conduits for identity theft. Investigators reckon he used the software to scour users' systems on the hunt for income tax returns, student financial aid applications, credit reports and other documents that might give con men enough information about users to impersonate them.

According to court papers, Kopiloff used purloined information to establish bogus credit card accounts to fraudulently purchase thousands of dollars of merchandise, which he resold at half their true value. Investigators have identified 83 victims, the Seattle Post reports.

Kopiloff was arrested and charged last week with mail fraud, computer hacking and aggravated identity theft offences. If convicted, he faces a maximum 29 years imprisonment.

File sharing client software is frequently updated. During the update process, it would be an easy enough mistake to accidentally allow access to a whole PC, rather than just a few directories, according to Geoff Sweeney, CTO of security firm Tier-3. "The fact that he [the suspect] appears to be have been able to cherry-pick only those people earning more than $150,000 suggests he had a wealth of user files to choose from," Sweeney added. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.