Feeds

Convicted Trojan author in new hacking charge

Back before the beak

5 things you didn’t know about cloud backup

A former hacker who went to prison as a teenager over a stock-trading scam is back in trouble with the law.

Van T. Dinh, 25, was charged with two counts of computer hacking last Friday over accusations he hacked into an online currency exchange service before allegedly attempted to transfer $110,000 to an account under his control. The alleged transfers were made in two batches days apart in December 2008, after Dinh had allegedly broken into the firm's admin systems. He's further accused of using this privileged access in attempting currency trades involving two other third-party customer accounts, and of trying to transfer $140,000 into one of these accounts.

FBI investigators traced the fraudulent transaction attempts back to the Pennsylvanian home Dinh shares with his mother. Although the attempted scam cost its unnamed victim $5,000 in restoration and recovery costs the fraud was detected before any money was actually transferred.

Dinh's previous brush with the law also involved online trading accounts.

He was jailed for 13 months in 2004 after he was convicted of hacking into an account run by a fellow stock trader to buy a variety of worthless stock derivatives he had got stuck with the year before, while working as a 19 year-old stock trader. The tactic made Dinh the first person to be charged with both computer hacking and identity theft offences, Wired reports. The junior trader created a Trojan horse program that posed as a stock-tracking tool.

When his victim used the tool he handed over access to a trading account. Dinh used this access to sell on Cisco "put" options that were about to expire, shaving his potential losses of $90,000 by $37,000 in the process.

Dinh has been held on remand pending further hearings, partly over fears he might hack into other systems if released. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?