Feeds

Convicted Trojan author in new hacking charge

Back before the beak

Boost IT visibility and business value

A former hacker who went to prison as a teenager over a stock-trading scam is back in trouble with the law.

Van T. Dinh, 25, was charged with two counts of computer hacking last Friday over accusations he hacked into an online currency exchange service before allegedly attempted to transfer $110,000 to an account under his control. The alleged transfers were made in two batches days apart in December 2008, after Dinh had allegedly broken into the firm's admin systems. He's further accused of using this privileged access in attempting currency trades involving two other third-party customer accounts, and of trying to transfer $140,000 into one of these accounts.

FBI investigators traced the fraudulent transaction attempts back to the Pennsylvanian home Dinh shares with his mother. Although the attempted scam cost its unnamed victim $5,000 in restoration and recovery costs the fraud was detected before any money was actually transferred.

Dinh's previous brush with the law also involved online trading accounts.

He was jailed for 13 months in 2004 after he was convicted of hacking into an account run by a fellow stock trader to buy a variety of worthless stock derivatives he had got stuck with the year before, while working as a 19 year-old stock trader. The tactic made Dinh the first person to be charged with both computer hacking and identity theft offences, Wired reports. The junior trader created a Trojan horse program that posed as a stock-tracking tool.

When his victim used the tool he handed over access to a trading account. Dinh used this access to sell on Cisco "put" options that were about to expire, shaving his potential losses of $90,000 by $37,000 in the process.

Dinh has been held on remand pending further hearings, partly over fears he might hack into other systems if released. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?