Man gets 6 years for hacking victims' computers to extort photos
Luis Mijangos would hack his victims computers and then spy on them using their own webcams and microphones
IDG News Service - A 32-year-old paraplegic was sentenced to six years in prison for infecting more than 100 computers in a quest for financial information, nude photographs and thrills.
Luis Mijangos worked as a freelance computer consultant in Santa Ana, California, earning about $1,000 per week writing programs and building websites. But he lived a double life, also earning as much as $3,000 per day hacking and stealing financial information from his victims.
He built virtually undetectable malware and used a variety of techniques to trick his victims into installing it on their computers. Then, he did more than just steal bank account numbers. "He read victims' e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers," prosecutors said in court filings. "Often, he then used the information he obtained to play psychological games with his victims."
One victim, a juvenile identified by prosecutors only as S.G., sent Mijangos pornographic photos after he hacked into her computer and tricked her over instant message into believing he was her boyfriend. Mijangos then threatened to post the photos online if she didn't send him more pictures.
"It made me untrusting and paranoid to this day," S.G. wrote in a victim impact statement. "I didn't know who this man was, why he was doing it or [if] he would come back. Not knowing is the worst, most dreaded feeling."
Mijangos stole nude photos from the laptop of another victim -- a college student identified as A.V. -- and then listened in on her computer's microphone when the scared girl reported the incident to campus police. He then sent threatening e-mails to A.V. and her boyfriend to punish them for contacting authorities. According to court filings, "She reported feeling 'terrorized' by [Mijangos], was afraid for her safety, and did not leave her dorm room for a week after the episode."
As part of his criminal hacking life, Mijangos told police that he used open-source cryptor software to make malicious programs undetectable by antivirus programs. He worked with other criminals he met in an international online IRC (Internet Relay Chat) forum for identity thieves called CC Power.
He spread his malware -- often remote access tools such as Poison Ivy or SpyNet - by disguising it as a song on peer-to-peer networks or e-mailing or instant messaging it to victims disguised as a video.
Mijangos pleaded guilty to hacking and wiretapping in March. He was sentenced Thursday in Los Angeles at the U.S. District Court for the Central District of California.
He's the latest in a string of hackers to be accused of "sextortion" -- breaking into computers or e-mail accounts and then threatening to post compromising photographs unless his victims provide him with more pictures.
In January, George Bronk of Sacramento, Calif., pleaded guilty to charges that he broke into more than 3,200 e-mail accounts looking for sexy photos, which he then threatened to post to the Internet. He was sentenced to four years in prison. In February, James Dale Brown of Fremont, Calif., admitted that he tried to coerce a 14-year-old girl into sending him a pornographic video by threatening to post explicit pictures of her online.
The FBI has seen a rise in this type of case, said Steven Martiniez, the assistant director of the FBI's Los Angeles field office, in a statement.
- Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
- Target attack shows danger of remotely accessible HVAC systems
- U.S. is investigating Target data breach, AG Holder says
- Russian man pleads guilty in SpyEye malware case
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts