Feeds

Uber-hacker Max Vision misses the killswitch

Cohorts unravel secret life

Choosing a cloud hosting partner with confidence

Having already done time in prison, Max Butler - aka Max Vision - went to great extremes to cloak his new and allegedly-illegal activities from prying eyes. But court documents filed in a case charging him with five new counts of fraud suggest that despite the care he took, much of his undoing came at his own hands - and the hands of associates he trusted the most.

The hacker, who in 2001 pleaded guilty to unleashing a worm that accessed computers at a US Air Force base, employed a "killswitch" on his PC that allowed him to destroy incriminating data at a moment's notice, according to an affidavit.

"If Butler is within reach of his computer, he needs only 'two keystrokes' to destroy the evidence on the computer," Christopher Aragon, an associate of Butler's who was arrested in May for identity theft, told investigators.

The San Francisco native also kept two residences. One was allegedly reserved for conducting illegal hacking, such as breaking into data processing centers and financial institutions. It was rented under a false name - in at least one case "Daniel Chance" - and paid in advance by a money order signed by a person who worked for Butler.

And he maintained at least four online identities, including Iceman, Aphex, Digits and Darkest. While he allegedly used some of the handles to openly engage in the trafficking of stolen credit cards, he worked hard to keep a clean reputation for Iceman. He used the ID in public forums on Cardersmarket, a website he allegedly operated that offered information and discussions concerning various forms on online fraud.

Follow the Credit

For a while, the secrecy worked well. Butler, according to court documents, would largely work in obscurity as he used large antennas to pull sensitive data transmitted over Wi-Fi networks. By limiting what associates and outsiders knew about him and his activities, he made it hard for authorities to build a case against him.

Then, through a combination of bad luck and poor judgment, Butler's enterprise began to unravel. In May, Aragon was arrested in Newport Beach, California for allegedly using counterfeit American Express gift cards to buy about $13,000 worth of designer purses in a single day. He is awaiting trial.

This was a problem for Butler, according to court documents, because Aragon was one of the people who bought credit card numbers Butler obtained.

"Aragon's group would manufacture or re-encode credit cards with the stolen credit card information and have his 'crew' use those cards to make in-store purchases," the 28-page affidavit alleges. Much of the merchandise was then sold on eBay by an user who went under the name "Stylish_shelly."

Following the arrest, Butler went so far as to flee San Francisco for Vancouver and discard a cell phone that linked him to Aragon. But according to the affidavit, Butler made some crucial mistakes. For one, he used a prepaid credit card that had been purchased by Aragon during his stint in Vancouver. And a few days later, he used it to buy a new phone.

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.