Feeds

Uber-hacker Max Vision misses the killswitch

Cohorts unravel secret life

The Essential Guide to IT Transformation

Having already done time in prison, Max Butler - aka Max Vision - went to great extremes to cloak his new and allegedly-illegal activities from prying eyes. But court documents filed in a case charging him with five new counts of fraud suggest that despite the care he took, much of his undoing came at his own hands - and the hands of associates he trusted the most.

The hacker, who in 2001 pleaded guilty to unleashing a worm that accessed computers at a US Air Force base, employed a "killswitch" on his PC that allowed him to destroy incriminating data at a moment's notice, according to an affidavit.

"If Butler is within reach of his computer, he needs only 'two keystrokes' to destroy the evidence on the computer," Christopher Aragon, an associate of Butler's who was arrested in May for identity theft, told investigators.

The San Francisco native also kept two residences. One was allegedly reserved for conducting illegal hacking, such as breaking into data processing centers and financial institutions. It was rented under a false name - in at least one case "Daniel Chance" - and paid in advance by a money order signed by a person who worked for Butler.

And he maintained at least four online identities, including Iceman, Aphex, Digits and Darkest. While he allegedly used some of the handles to openly engage in the trafficking of stolen credit cards, he worked hard to keep a clean reputation for Iceman. He used the ID in public forums on Cardersmarket, a website he allegedly operated that offered information and discussions concerning various forms on online fraud.

Follow the Credit

For a while, the secrecy worked well. Butler, according to court documents, would largely work in obscurity as he used large antennas to pull sensitive data transmitted over Wi-Fi networks. By limiting what associates and outsiders knew about him and his activities, he made it hard for authorities to build a case against him.

Then, through a combination of bad luck and poor judgment, Butler's enterprise began to unravel. In May, Aragon was arrested in Newport Beach, California for allegedly using counterfeit American Express gift cards to buy about $13,000 worth of designer purses in a single day. He is awaiting trial.

This was a problem for Butler, according to court documents, because Aragon was one of the people who bought credit card numbers Butler obtained.

"Aragon's group would manufacture or re-encode credit cards with the stolen credit card information and have his 'crew' use those cards to make in-store purchases," the 28-page affidavit alleges. Much of the merchandise was then sold on eBay by an user who went under the name "Stylish_shelly."

Following the arrest, Butler went so far as to flee San Francisco for Vancouver and discard a cell phone that linked him to Aragon. But according to the affidavit, Butler made some crucial mistakes. For one, he used a prepaid credit card that had been purchased by Aragon during his stint in Vancouver. And a few days later, he used it to buy a new phone.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.