Feeds

Fake student hacker avoids jail over ID theft scam

Faux uni man installed password-cracking hack attack

Reducing security risks from open source software

A computer hacker who posed as a student and used key-logging software to break into the email accounts of genuine students has been ordered to pay £21,000 in compensation and ordered to complete a 200-hour community service order.

Daniel Woo, 23, a Bulgarian resident in London, avoided going to jail but received an eight-month suspended sentence at a sentencing hearing at London's Southwark Crown Court on Wednesday. Woo, who admitted to hacking offices contrary to the Computer Misuse Act, was caught in the act of installing password-capturing software at the University of London's School of Oriental and African Studies by IT staff back in November 2006.

Police from the Metropolitan Police Service's Police Central e-Crime Unit were called in to investigate and quickly established that Woo was not a student and had no business being on campus. A subsequent investigation revealed that Woo had misused password-cracking software called Cain and Abel to capture network data and crack student email passwords.

Woo used access to student email accounts to identify and target bank accounts linked to these email address. Police were able to establish that a number of these compromised accounts were subsequently the victims of fraud.

Upon initial questioning, Woo denied everything, a line that crumbled once eyewitness accounts and CCTV records showed he had visited the University of London campus on at least 10 occasions. Officers were later able to establish that Woo had carried out the same scam at the University of Coventry.

The court banned Woo from any university or college premises without police permission for a year and ordered him to serve two years on probation.

A Met Police statement on the case can be found here. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.