Man charged with hacking Scarlett Johansson, other celebs
The 35-year-old is linked to the release of nude photos of Johansson
IDG News Service - A 35-year-old man was arrested Wednesday on charges that he broke into the email accounts of numerous Hollywood celebrities and stole private photographs and correspondence.
Christopher Chaney, of Jacksonville, Florida, is accused of breaking into more than 50 online accounts over the past year, including those of Scarlett Johansson, Christina Aguilera and Mila Kunis, the U.S. Federal Bureau of Investigation said.
"Chaney distributed some of the files he obtained illegally, including photos of celebrities, and offered them to various celebrity blog sites," the FBI said.
Nude photos of Johansson, apparently taken with her smartphone, surfaced online last month, as did private photos of Kunis and Justin Timberlake.
Chaney allegedly dug up personal information about the celebrities on the Internet and used it to break into their Yahoo, Apple and Google email accounts. Prosecutors didn't say how he did this, but in the past, hackers have broken into accounts by finding the answers to password-reset questions. David Kernell accessed Sarah Palin's Yahoo Mail account using this technique, for example.
Chaney allegedly found new victims by scanning the address books of his targets, and by setting up their accounts to auto-forward emails to his own address. That meant that even after the stars had reset their passwords, he was still able to read their mail, the FBI said.
He used online aliases including trainreqsuckswhat, anonygrrl and jaxjaguars911, according to court filings.
Chaney could not be reached for comment, and his lawyer did not immediately return a call seeking comment.
If convicted of all 26 charges against him, Chaney faces 121 years in prison. He is expected to be tried in Los Angeles.
"Just because you're an actor or make films or whatever doesn't mean you're not entitled to your own personal privacy," Johansson told CNN last month. "If that is sieged in some way, it feels unjust. It feels wrong."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cybercrime and Hacking White Papers | Webcasts