Feeds

Kiwi telecom inks contract with convicted hacker

Akill's killing

Intelligent flash storage arrays

New Zealand's No. 2 telecommunications company has hired a 16-year-old botnet herder less than 12 months after he pleaded guilty to six computer hacking and fraud charges following an international investigation.

Owen Thor Walker could have received up to five years for his offenses. Now, he has received a contract to provide seminars to TelstraClear, the New Zealand subsidiary to Australia's Telstra. A spokesman for the company said Walker's contract was linked to an online security product known as DMZGlobal.

Authorities accused Walker of operating a botnet composed of more than 1.3 million infected computers. He also crippled a server at the University of Pennsylvania when, in February of 2006, he illegally used it to install updated malware on the fleet of zombie machines under his control, authorities have alleged. He operated under the pseudonym Akill and was ultimately apprehended in an FBI sting dubbed Operation Bot Roast.

TelstraClear's decision to hire a newly convicted hacker seems to be part of a growing trend. Earlier this month, serial entrepreneur Jason Calacanis admitted he gave John Kenneth Schiefer unfettered "root" access to his startup's computer network, despite Schiefer's admission 16 months ago that he used a massive botnet to steal bank passwords and other sensitive information.

Other convicts to receive lucrative jobs include Gabriel Bogdan Ionescu, a 22-year-old Romanian hacker who even before he had finished serving his sentence has received an offer for part-time work from a company called Way-Log.

A TelstraClear spokesman was careful to tell a New Zealand publication that Walker had no access to the company's computer network. Still, hiring a freshly convicted hacker to provide security consulting makes about as much sense as hiring a cat burglar to lock down an art museum. Keep hiring cybercriminals and soon every script kiddie will want to be indicted. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.