Feeds

Fake student hacker avoids jail over ID theft scam

Faux uni man installed password-cracking hack attack

SANS - Survey on application security programs

A computer hacker who posed as a student and used key-logging software to break into the email accounts of genuine students has been ordered to pay £21,000 in compensation and ordered to complete a 200-hour community service order.

Daniel Woo, 23, a Bulgarian resident in London, avoided going to jail but received an eight-month suspended sentence at a sentencing hearing at London's Southwark Crown Court on Wednesday. Woo, who admitted to hacking offices contrary to the Computer Misuse Act, was caught in the act of installing password-capturing software at the University of London's School of Oriental and African Studies by IT staff back in November 2006.

Police from the Metropolitan Police Service's Police Central e-Crime Unit were called in to investigate and quickly established that Woo was not a student and had no business being on campus. A subsequent investigation revealed that Woo had misused password-cracking software called Cain and Abel to capture network data and crack student email passwords.

Woo used access to student email accounts to identify and target bank accounts linked to these email address. Police were able to establish that a number of these compromised accounts were subsequently the victims of fraud.

Upon initial questioning, Woo denied everything, a line that crumbled once eyewitness accounts and CCTV records showed he had visited the University of London campus on at least 10 occasions. Officers were later able to establish that Woo had carried out the same scam at the University of Coventry.

The court banned Woo from any university or college premises without police permission for a year and ordered him to serve two years on probation.

A Met Police statement on the case can be found here. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.