Feeds

Job-seeking Marriott hacker gets 30 months' porridge

Nabbed and jailed after Secret Service sting

Boost IT visibility and business value

A job-seeking Hungarian hacker who tried to land work with Marriott by hacking into the hotel chain's network before "offering" to sort out the resulting mess has been found guilty of hacking and attempted extortion and jailed for 30 months.

Attila Nemeth, 26, admits sending Trojan-infected emails to workers at the hotel late in 2010, allowing him to access back end servers from PCs he managed to infect. Nemeth extracted sensitive information which he threatened to reveal unless the hotel chain offered him a job maintaining Marriott's systems.

Marriott responded to this by reporting Nemeth to the US Secret Service, which ran a sting operation. Nemeth entered into an email and phone conversion with a fed posing as a hotel manager before he was persuaded to travel to the US, ostensibly to attend an all-expenses-paid job interview.

Under the guise of an interview, Nemeth was coaxed into explaining how he hacked into Marriott's systems. He was subsequently arrested and charged with computer crime and extortion.

The hacker pleaded guilty to both offences last November prior to a sentencing hearing last week, where he was sentenced to 30 months behind bars, the Wall Street journal reports.

Marriott estimates Nemeth's hack resulted in expenses of between $400,000 and $1m in consultant expenses and other costs associated with figuring out how much damage the hacker might have caused. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?