Feeds

Teenage duo sentenced over credit card Ghostmarket

'I will never get a job in IT,' laments hacker

  • alert
  • submit to reddit

Seven Steps to Software Security

Two UK teenagers received sentences for repeated hack attacks that stole credit card data and took one online webhost offline.

Zachary Woodham, 19, and Louis Tobenhouse, 18, pleaded guilty to the online offenses in late December, members of the Metropolitan Police Service's Police Central e-Crime Unit said on Monday. Using the hacker alias “Colonel Root,” Woodham repeatedly attacked webhosting company Punkyhosting over several weeks and then sent emails that gloated about his actions.

Police said they eventually identified Woodham as an active participant in Ghostmarket, an online marketplace for stolen wares that also offered tutorials on online scams. Police searching the teens' computers found data for thousands of compromised payment cards and evidence that they targeted online casinos, betting companies and other online firms. Woodham also used some of the stolen cards to pay for access to premium chat lines that he owned.

In March, four people affiliated with Ghostmarket received a combined 15 years in prison. Those sentenced included Nick Webber, then 19 years old, whose computer contained details of thousands of stolen credit cards. He was busted in October 2009 after trying to use a counterfeit credit card to pay for a hotel stay.

Webber and fellow accomplice Gary Kelly, 21, received five years in prison, while cronies Ryan Thomas, 18, received four years, and Shakira Ricardo, 21, was imprisoned for 18 months. Police at the time said Ghostmarket boasted 8,000 members and facilitated a range of crimes including the sale of stolen credit card and personal details.

Woodham and Tobenhouse posted tutorials on Ghostmarket that gave advice on hacking into company websites, committing fraud and evading capture by authorities, police said.

Woodham received a sentence of 18 months imprisonment that will be suspended in two years. Tobenhouse was sentenced to 200 hours of unpaid work.

Upon his arrest, Tobenhouse said: “I will never get a job in IT now.” To which we say: not necessarily. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.