Man charged with hacking Scarlett Johansson, other celebs
The 35-year-old is linked to the release of nude photos of Johansson
IDG News Service - A 35-year-old man was arrested Wednesday on charges that he broke into the email accounts of numerous Hollywood celebrities and stole private photographs and correspondence.
Christopher Chaney, of Jacksonville, Florida, is accused of breaking into more than 50 online accounts over the past year, including those of Scarlett Johansson, Christina Aguilera and Mila Kunis, the U.S. Federal Bureau of Investigation said.
"Chaney distributed some of the files he obtained illegally, including photos of celebrities, and offered them to various celebrity blog sites," the FBI said.
Nude photos of Johansson, apparently taken with her smartphone, surfaced online last month, as did private photos of Kunis and Justin Timberlake.
Chaney allegedly dug up personal information about the celebrities on the Internet and used it to break into their Yahoo, Apple and Google email accounts. Prosecutors didn't say how he did this, but in the past, hackers have broken into accounts by finding the answers to password-reset questions. David Kernell accessed Sarah Palin's Yahoo Mail account using this technique, for example.
Chaney allegedly found new victims by scanning the address books of his targets, and by setting up their accounts to auto-forward emails to his own address. That meant that even after the stars had reset their passwords, he was still able to read their mail, the FBI said.
He used online aliases including trainreqsuckswhat, anonygrrl and jaxjaguars911, according to court filings.
Chaney could not be reached for comment, and his lawyer did not immediately return a call seeking comment.
If convicted of all 26 charges against him, Chaney faces 121 years in prison. He is expected to be tried in Los Angeles.
"Just because you're an actor or make films or whatever doesn't mean you're not entitled to your own personal privacy," Johansson told CNN last month. "If that is sieged in some way, it feels unjust. It feels wrong."
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts