Feeds

French hacker cuffed after bragging on telly

D'eau!

Securing Web Applications Made Simple and Scalable

Updated A French hacker who boasted of breaking into the systems of a government security contractor on national television has suffered some unsurprising consequences.

The alleged miscreant, identified only as Carl, appeared on a programme called Complément d'enquête (Further Investigation) to demonstrate how he broke into the network of the French Army and Thales, the information security group, at the start of April.

He was arrested in Paris six days later on 7 April, following a complaint by Thales. Investigating police reportedly recovered credit card and bank account data from his computer.

During the programme the hacker claimed to be a member of Anonymous. However, during the same programme, Anonymous issued a statement saying making "easy money" through cybercrime is not what it was about.

The Complément d'enquête producers stated they did not co-operate with French authorities in tracking down Carl and only learned of his arrest, like everyone else, when the story was covered by AFP (Google translation here).

Thales issued a holding statement, confirming it had initiated an investigation, and that it takes security seriously, while saying little else.

"As the investigation is underway, we are unable to make further comment until the full facts of the case are known," it said. "However, we would emphasise that we take our own data security incredibly seriously and we have industry leading procedures and safeguards in place to prevent unauthorised access." ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.