Feeds

Florida man 'fesses to naked Scarlett Johansson outrage

Hot pics nicked from email boxes, leaked to gossip rags

5 things you didn’t know about cloud backup

A Florida man has admitted hacking into the email accounts of celebrities including Mila Kunis and Scarlett Johansson.

Christopher Chaney, 35, of Jacksonville, Florida, agreed on Monday to plead guilty to nine felony charges including computer hacking and wiretapping, AP reports.

The plea follows Chaney's arrest in October following a year-long police probe codenamed Operation Hackerazzi, which was sparked by the unauthorised publication of nude pics of female stars on the net.

Prosecutors suspect Chaney broke into the email accounts of more than 50 entertainment luminaries, including Christina Aguilera and Johansson. Nude self-portrait photos of Johansson, which were meant only for her for her then-husband Ryan Reynolds, were leaked online following the hacks.

It seems Chaney guessed the security reset questions of celebrity accounts using publicly available information, the same tactic used to hijack the webmail account of Sarah Palin at the time the former Governor of Alaska was running for vice-president.

Having gained privileged access to a star's email account, Chaney changed the settings so that every email received by the account was forwarded to an address under his control. Chaney subsequently forwarded the celeb photos he received to two gossip websites and another hacker. There is no suggestion that he profited financially from his celebrity hacking hobby, a factor that may count as mitigation when it comes to sentencing.

"Chris has been very cooperative with prosecutors, he's remorseful for any of the harm caused to the stars, and just looks to a resolution of the case," defence attorney Christopher Chestnut told the news agency. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.