Feeds

Uber-hacker Max Vision misses the killswitch

Cohorts unravel secret life

The essential guide to IT transformation

Having already done time in prison, Max Butler - aka Max Vision - went to great extremes to cloak his new and allegedly-illegal activities from prying eyes. But court documents filed in a case charging him with five new counts of fraud suggest that despite the care he took, much of his undoing came at his own hands - and the hands of associates he trusted the most.

The hacker, who in 2001 pleaded guilty to unleashing a worm that accessed computers at a US Air Force base, employed a "killswitch" on his PC that allowed him to destroy incriminating data at a moment's notice, according to an affidavit.

"If Butler is within reach of his computer, he needs only 'two keystrokes' to destroy the evidence on the computer," Christopher Aragon, an associate of Butler's who was arrested in May for identity theft, told investigators.

The San Francisco native also kept two residences. One was allegedly reserved for conducting illegal hacking, such as breaking into data processing centers and financial institutions. It was rented under a false name - in at least one case "Daniel Chance" - and paid in advance by a money order signed by a person who worked for Butler.

And he maintained at least four online identities, including Iceman, Aphex, Digits and Darkest. While he allegedly used some of the handles to openly engage in the trafficking of stolen credit cards, he worked hard to keep a clean reputation for Iceman. He used the ID in public forums on Cardersmarket, a website he allegedly operated that offered information and discussions concerning various forms on online fraud.

Follow the Credit

For a while, the secrecy worked well. Butler, according to court documents, would largely work in obscurity as he used large antennas to pull sensitive data transmitted over Wi-Fi networks. By limiting what associates and outsiders knew about him and his activities, he made it hard for authorities to build a case against him.

Then, through a combination of bad luck and poor judgment, Butler's enterprise began to unravel. In May, Aragon was arrested in Newport Beach, California for allegedly using counterfeit American Express gift cards to buy about $13,000 worth of designer purses in a single day. He is awaiting trial.

This was a problem for Butler, according to court documents, because Aragon was one of the people who bought credit card numbers Butler obtained.

"Aragon's group would manufacture or re-encode credit cards with the stolen credit card information and have his 'crew' use those cards to make in-store purchases," the 28-page affidavit alleges. Much of the merchandise was then sold on eBay by an user who went under the name "Stylish_shelly."

Following the arrest, Butler went so far as to flee San Francisco for Vancouver and discard a cell phone that linked him to Aragon. But according to the affidavit, Butler made some crucial mistakes. For one, he used a prepaid credit card that had been purchased by Aragon during his stint in Vancouver. And a few days later, he used it to buy a new phone.

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?