Feeds

Kiwi telecom inks contract with convicted hacker

Akill's killing

The Essential Guide to IT Transformation

New Zealand's No. 2 telecommunications company has hired a 16-year-old botnet herder less than 12 months after he pleaded guilty to six computer hacking and fraud charges following an international investigation.

Owen Thor Walker could have received up to five years for his offenses. Now, he has received a contract to provide seminars to TelstraClear, the New Zealand subsidiary to Australia's Telstra. A spokesman for the company said Walker's contract was linked to an online security product known as DMZGlobal.

Authorities accused Walker of operating a botnet composed of more than 1.3 million infected computers. He also crippled a server at the University of Pennsylvania when, in February of 2006, he illegally used it to install updated malware on the fleet of zombie machines under his control, authorities have alleged. He operated under the pseudonym Akill and was ultimately apprehended in an FBI sting dubbed Operation Bot Roast.

TelstraClear's decision to hire a newly convicted hacker seems to be part of a growing trend. Earlier this month, serial entrepreneur Jason Calacanis admitted he gave John Kenneth Schiefer unfettered "root" access to his startup's computer network, despite Schiefer's admission 16 months ago that he used a massive botnet to steal bank passwords and other sensitive information.

Other convicts to receive lucrative jobs include Gabriel Bogdan Ionescu, a 22-year-old Romanian hacker who even before he had finished serving his sentence has received an offer for part-time work from a company called Way-Log.

A TelstraClear spokesman was careful to tell a New Zealand publication that Walker had no access to the company's computer network. Still, hiring a freshly convicted hacker to provide security consulting makes about as much sense as hiring a cat burglar to lock down an art museum. Keep hiring cybercriminals and soon every script kiddie will want to be indicted. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.