Feeds

Student accused of posting bogus coupons to 4chan

Caught following TOR anonymizer flub up

Remote control for virtualized desktops

A computer science student has been charged with fraud and counterfeiting for allegedly posting hundreds of thousands of dollars worth of bogus coupons on 4chan and other websites.

Lucas Townsend Henderson, 22, of Lubbock, Texas, was charged with wire fraud and trafficking in counterfeit goods in a criminal complaint unsealed on Wednesday. He is accused of posting fraudulent coupons online that allowed people to receive steep discounts on beer, food, game consoles and other consumer items even though the manufacturers never authorized the promotions.

Authorities also said he provided tutorials explaining how to print out the coupons and redeem them at stores.

“7.00 off a 40 OZ bag of hershey's kisses,” a Zoklet.net user with the ID of Anonymous123 wrote in a July 18 message. “Think about it. You can give someone special around 8x the chocolate you might normally be able to get them for the normal price. I don't recommend you use 8 of these coupons at once though, as spending $8(plus tax), for about $60 worth of chocolate might look suspicious.”

From July to March, Henderson used a variety of online identities to post hundreds of thousands of dollars worth of coupons for Microsoft Xboxes, Sony PlayStations, Tide laundry detergent, candy, energy drinks and other merchandise. In December alone, Proctor & Gamble incurred costs of $200,000 in connection with the detergent discounts even though it had never issued a single online coupon. The bogus documents contained a forged logo that read “Powered by SmartSource”

A student enrolled in the Rochester Institute of Technology's Computing and Information Sciences program, Henderson took pains to cover his tracks by using the TOR anonymizer to conceal his IP address, prosecutors said. FBI agents closed in on him after he failed to use the free service when posting a coupon to Zoklet.net, according to court documents.

Agents soon raided Henderson's home, where they found “a number of coupons for various food and beverage items.”

A PDF of the nine-page complaint is here. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.