Michigan man pleads guilty to wireless hack into stores
Brian Salcedo could face up to 18 years in prison
IDG News Service - A Michigan man pleaded guilty on Friday to four counts of wire fraud and unauthorized access to a computer after he and two accomplices used a vulnerable wireless network at a Lowe's Companies Inc. store in Michigan to attempt to steal credit card numbers from the company's main computer systems in North Carolina and other Lowe's stores in the U.S.
Brian Salcedo could face up to 18 years in prison for the crime, which the government claims could have caused more than $2.5 million in damages. However, federal prosecutors will ask for a more lenient sentence in exchange for Salcedo's cooperation in other investigations stemming from the incident and full disclosure of details about the intrusions on Lowe's network, according to a copy of the plea agreement.
The case stems from a series of hacks in October and November 2003 in which Salcedo's two alleged accomplices, Adam Botbyl and Paul Timmins, discovered a loosely protected wireless LAN connection at a Lowe's store in Southfield, Mich., while scanning for open connections -- or "war driving" -- in the area.
The trio subsequently used the open access point to compromise the entire corporate network of the Mooresville, N.C.-based home improvement retail chain, hacking into stores in California, Kansas, South Dakota and other states in the weeks that followed. Among other things, the three attempted to install a modified version of a credit processing program called "tcpcredit" that skimmed credit account information for every transaction processed at a particular Lowe's store, according to the indictment filed with the U.S. District Court for the Western District of North Carolina.
In November, a grand jury indicted the three on 16 counts of wire fraud and unauthorized intrusion. In May, both Salcedo and Botbyl reached plea agreements, with Botbyl agreeing to plead guilty to one count of conspiracy to gain unauthorized access to a nationwide computer network.
The third member of the group, Paul Timmins, is scheduled to appear in court for arraignment on June 28.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Is SQL Server AlwaysOn really as powerful? Tips and Tricks from the field With the introduction of AlwaysOn, Windows Clustering Services is now more critical than ever. All Cybercrime and Hacking White Papers | Webcasts