Feeds

Miss Teen US 'sextortion' hacker pleads guilty

19-year-old cops to capturing pics and vids on hacked webcams

Maximizing your infrastructure through virtualization

A teenage computer science student from California faces a possible prison sentence after pleading guilty to hacking into the webcams of young women, among them Miss Teen USA, Cassidy Wolf.

Jared James Abrahams, 19, of Temecula in California, admitted to hacking into the computers of at least two dozen women including Wolf before covertly taking pictures of them in various states of undress using computer webcams. He subsequently threatened to publish these photos online through social media websites unless his victims complied with his demands to supply even more intimate images or videos of them stripping.

His victims' ages ranged from 16 to 20-something and they were from countries including Ireland, Canada, Russia and Moldova as well as the US, according to prosecutors. According to an FBI statement released at the time of Abrahams' arrest in September:

The sextortion investigation began around March 2013 and continued for several months as multiple victims’ online accounts were compromised, or hacked, by an individual later identified as Abrahams. According to the complaint, Abrahams used malicious software and tools to disguise his identity in order to capture nude photos or videos of female victims through remote operation of their webcams without their consent. Abrahams contacted some victims using email accounts he had taken over, in some cases.

The complaint alleges Abrahams targeted some victims he knew personally and identified others by hacking into Facebook pages shared by other victims. The complaint alleges Abrahams would generally attach victims’ photos to emails he sent them when he made extortionate demands. Abrahams threatened to publicly post compromising photos or video to the victims’ online social media accounts unless the victim either sent nude photos or videos or engaged in a Skype session with him and did what he said for five minutes, according to the complaint.

At least two victims complied with his demands, authorities said in court records.

Abrahams has pleaded guilty to three counts of extortion and one count of unauthorised access of a computer. He is due to be sentenced in March, when he faces a likely sentence of around two-and-a-half years imprisonment, but could potentially serve 11 years, according to a plea bargaining deal.

Using malware to infect personal computers before initiating sexual-related blackmail attempts has sadly become far from rare over recent years. The consequences for victims can be harrowing, traumatic and (in isolated cases) has even led to a victim's suicide.

"Cassidy Wolf, who apparently was a classmate of Abrahams, did not buckle to his blackmail threats, and has used her platform as a beauty pageant winner to warn other young people of the risks posed by webcams," notes veteran antivirus researcher Graham Cluley in a blog post.

"If you’re worried that hackers might be able to see you through your webcam, take care over the links you click on and the software you install on your computer, keep your security patches and anti-virus software up-to-date and consider sticking a band-aid over the webcam when you don’t want to use it," he advised.

Wolf herself echoed the same advice about covering webcams when not in use in a Twitter update. ®

Application security programs and practises

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.