Hacking court computer systems to spread malicious emails, hackers jailed for 145 months
A man living in Texas, USA, has bowed his head to plead guilty to allegations of unauthorized access and abuse of the Los Angeles Supreme Court (LASC) network to spread fraudulent emails, after being arrested. 2 months ago. With this crime, the hacker will almost certainly face a re-education sentence held at a federal prison, along with a range of related compensation.
Specifically, this man named Oriyomi Sadiq Aloba, 33, from Katy, Texas, was charged with distributing about 2 million malicious emails and storing hundreds of credit card records on his computer system. LASC that he can hack. On this charge, Aloba was sentenced to 145 months in prison by Federal Court.
Aloba and his accomplices hacked LASC's computer system in July 2017 by spreading malicious code through the email account of a court employee. Since then, he has sent fraudulent emails to colleagues on this employee's account and linked them to a fake website that asked for the email address and password, user account associated with it. LASC.
These phishing emails have been sent to thousands of people by the Aloba group, including more than 100 victims who have been trapped, providing attackers with their credentials in the LASC network. In total, more than 2 million phishing emails were distributed by Aloba and his accomplices.
When searching Aloba's whereabouts, police discovered a USB storage drive hidden in the toilet, a broken iPhone in the bathroom sink and a laptop in the warehouse.
Aloba's accomplice, Robert Charles Nicholson, 28, of Brooklyn, New York, was arrested and convicted in June. He will be sentenced on November 4, while three others are determined to live outside the United States.
You should read it
- Malicious ad campaigns abuse Chrome to steal 500 million iOS user sessions
- Excel continues to be used as a lure for online fraud with complex mechanisms
- Hacker purged two-factor security just by automated phishing attacks
- Air New Zealand hacked, customer information is at risk of falling into the hands of hackers
- Hackers found a way to bypass Microsoft Office 365 Safe Links
- The most dangerous places on the Web
- Microsoft admits hackers may have read Outlook email and warned users to change their passwords
- Test knowledge about hacking
May be interested
- Security terminternet hacking and hacking activities have become a part of the computer industry. despite the changes and expansions, but as people often say, 'where technology goes, hackers go there'. the best measure against c & aa
- Storm Deep uses YouTube to spreadyoutube's 'invite friends to watch videos' feature recently has been used by spammers to spread spam with dangerous 'worm' implants.
- 10 operating systems for security research preferred by hackershere is a list of 10 computer operating systems used by hackers worldwide, please refer.
- How to Prevent Cell Phone Hackingyou discover that intimate conversations, images and messages have been spread online. this is not only an invasion of other people's privacy but also affects your personal life. although many politicians and celebrities have fallen victim to mobile phone hacking, you now have ways to protect your device. this article will provide information to help you protect yourself and your loved ones from phone-related scandals or becoming victims of privacy invasion by hackers.
- The leading site to learn hacking skillswhen it comes to hackers, perhaps the first model we imagine is college students or experts in computer science.
- Learn about Ethical hacking using Kali Linux and Raspberry Pia raspberry pi 3 runs kali linux for building amazing hacking skills. this small computer is cheap, powerful and very flexible.
- How to Make It Look Like You Are Hackingmaybe you have a reputation as something of a computer genius, or maybe you want people to think you already are. hacking a computer requires knowledge about computer systems, network security, and code, so when people see what they think...
- Hackers Use Malicious Google Ads to Steal Users' Microsoft Accountsthere is a dangerous trend being deployed by the global hacker community, which is abusing the google ads platform to spread malicious code.
- What malicious code is designed to spread through IoT devices?mirai is a malicious code designed to spread through iot devices. click to see this article now to learn how to prevent your computer from being infiltrated by malicious codes!
- Basic Hack Techniques - Part Ito all of you, to meet the needs of learning in hacking and security, fantomas311 has compiled a set of basic hacking articles and hacking-related articles to introduce you to.