Feeds

Florida man 'fesses to naked Scarlett Johansson outrage

Hot pics nicked from email boxes, leaked to gossip rags

The Essential Guide to IT Transformation

A Florida man has admitted hacking into the email accounts of celebrities including Mila Kunis and Scarlett Johansson.

Christopher Chaney, 35, of Jacksonville, Florida, agreed on Monday to plead guilty to nine felony charges including computer hacking and wiretapping, AP reports.

The plea follows Chaney's arrest in October following a year-long police probe codenamed Operation Hackerazzi, which was sparked by the unauthorised publication of nude pics of female stars on the net.

Prosecutors suspect Chaney broke into the email accounts of more than 50 entertainment luminaries, including Christina Aguilera and Johansson. Nude self-portrait photos of Johansson, which were meant only for her for her then-husband Ryan Reynolds, were leaked online following the hacks.

It seems Chaney guessed the security reset questions of celebrity accounts using publicly available information, the same tactic used to hijack the webmail account of Sarah Palin at the time the former Governor of Alaska was running for vice-president.

Having gained privileged access to a star's email account, Chaney changed the settings so that every email received by the account was forwarded to an address under his control. Chaney subsequently forwarded the celeb photos he received to two gossip websites and another hacker. There is no suggestion that he profited financially from his celebrity hacking hobby, a factor that may count as mitigation when it comes to sentencing.

"Chris has been very cooperative with prosecutors, he's remorseful for any of the harm caused to the stars, and just looks to a resolution of the case," defence attorney Christopher Chestnut told the news agency. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.