Hospital employee busted for leaking patient information

Eight people been indicted in an identity theft case, one of whom is a Montefiore Medical Center employee. Members of the ring used patient information to make thousands of dollars worth of purchases at retailers and department stores in Manhattan.

The case is being heard by Manhattan District Attorney Cyrus R. Vance, Jr. and the defendants are being tried in the New York State Supreme Court on various counts of Grand Larceny in the Second and Third Degrees, Identity Theft in the First Degree, and Criminal Possession of a Forged Instrument in the Second Degree.

Monique Walker, 32, was an employee at Montefiore Medical Center. As an assistant clerk in one of the hospital wings she had access to patients’ names, dates of birth, Social Security numbers, and other personal information. During 2012 and 2013, she supplied information of thousands of patients to her partners in crime at $3 per patient.

The fraud is to the tune of $50,000 and information of as many as 12,000 people who were patients at Montefiore Medical Center could be compromised.

Group of cyber-criminals bases in different countries nabbed in joint international operation


A group of 49 cyber-criminals located in Italy, Spain, Poland, the United Kingdom, Belgium and Georgia were nabbed by the authorities in a joint international investigation.

From a total of 58 properties, authorities recovered and seized laptops, hard disks, telephones, tablets, credit cards and cash, SIM cards, memory sticks, forged documents and bank account documents.

The operation was headed by Europol's European Cybercrime Centre (EC3) and Eurojust, and was assisted by the Italian Polizia di Stato (Postal and Communications Police), the Spanish National Police, the Polish Police Central Bureau of Investigation, and supported by UK law enforcement bodies.

The arrested members are suspected of financial fraud to the tune of 6 million Euros. The group targeted medium and large European companies through malware and social engineering techniques.

The joint operation was coordinated from Europol's headquarters in The Hague.

High School students arrested for hacking school network

The principal of San Dimas High School in southern California said that two students studying in the school had been arrested for hacking the school network and changing grades of around 120 people.

The Cyber Crimes bureau of the Los Angeles Sheriff's Department is working closely with the school to investigate how the unauthorized access of the school network could have taken place.

 "We are very confident that we have the ability to restore all of the impacted scores. Teachers have been contacted and will be reviewing their student's grades for accuracy," said Principal Michael Kelly.

This is not the first recent incident in California after a student of Dixon High School in north California was also arrested earlier for unauthorized access to his school network.

Students whose grades were changed were interviewed by the authorities and some of them were suspended while the grades of all are being reverted back.

The teachers will be reviewing the grades again to make sure that the original grade is given to each student.

25-year-old student hacked University’s computers to upgrade his marks

A 25-year-old student, who hacked Birmingham University's computers to upgrade his marks, has been jailed for four years.

Imran Uddin, who was pursuing his final year in bio-science course at the University of Birmingham, increased his marks from 57 per cent to 73 per cent by stealing staffs passwords using a keyboard spying device.

According to the Birmingham Crown Court, in order to steal the staffs passwords, Uddin had attached a hardware keylogger at the back of computers.

The incident came into light on October 7 last year, when two staffs carried out a routine upgrade on a computer in the bio-science building.

The attached devices, which could record the key strokes of anyone, were found at the back of the computers when staff removed protective casing.

After that other computers of the University were checked where they found more such devices attached.

The court sent him to jail after he admitted six charges as per the Computer Misuse Act.

Judge James Burbidge QC told Uddin (The Telegraphreports), "For reasons not entirely clear to me, whether it was monetary, or pride or a desire to out-perform others, you decided to cheat and you formed a settled intention to do that. I consider your actions were planned and persistent.”
He added that this kind of conduct has the potential to undermine public confidence in the degree system, set up by this university.

“I have decided that I cannot pass a suspended sentence because there needs to be an element of deterrence," he said.

Madhu Rai, the prosecuting, said that the one of the devices was attached to a computer of Christine Chapman, a staff, who had access to the University grades.

Police found that Uddin had made ebay searches on his computer for keyboard cheating devices.

Balbir Singh, the defending, said that Uddin, who was the first person from his family to go to University, did so because of the pressure. He could not see clearly.

A spokeswoman for the Birmingham University said that they could not comment on individual cases, however, they took any criminal activity seriously and work closely with West Midlands Police.

Along with the legal sanctions, students, who convicted such crimes, face misconduct investigation and ultimately face permanent exclusion.

18-year-old Miami Student arrested for hacking school computer to change grades


Hacking School's computer network and changing the Grade is not the right way to get good Grades

A 18-year-old Miami High School student was arrested after he allegedly hacking into the Miami-Dade Public Schools database to his grades and grades of four other students.

Jose Bautista, was charged with multiple counts including intellectual property offence and offense against computer users, after he reportedly gave Princiapal a written confession.

He was released on a $20,000 bond.  Judge ordered him to place him under house arrest and wear a GPS tracking device.

"It's not fair to the people that really try," said Mayan Dehry, a senior student at the school."I don't know, if you're just going to be lazy and then change your grades, that's not what learning is about."

4 Cybercriminals from Vietnam arrested for using SMS malware to earn $100,000


Image Credits: Hanoimoi
Vietnam Police have arrested four individuals accused of stealing approximately $100,000 by infecting more than 100,000 mobile devices with a premium-rate SMS sending virus.

The suspects are identified as 23 year old Ha Xuan Tien, 24-year-old Nguyen Duc Luc, 25-year-old Nguyen Van Tu, 29-year-old Tran Ngoc Hai, according to Tuoitrenews.

The malicious applications which was used by suspects to infect users are said to be distributed via websites like "soundfest.com.vn", "clickdi.com". 

Once the malicious application infects a smart phone, the app will automatically send SMS messages to premium rate numbers.  Premium rate numbers allows the owner to earn money from incoming calls and SMS.

The victim will lose 15,000  Vietnamese Dong($0.71 in USD), after each message is sent from their device to these premium rate numbers.

Using this method, the cyber criminals manged to earn more than 2.1 Billion Vietnamese Dong($98,700 in USD) since late 2013.

Cyber criminals convicted of stealing more than £1 million using Fake job ads

Organized criminal network of five men and one woman have been convicted for stealing more than £1million from job hunters using fake job advertisements.

The members of the criminal are Adjibola Akinlabi (aged 26), Damilare Oduwole (26), Michael Awosile (27), Nadine Windley (26) and Temitope Araoye (29) and a malware writer "Tyrone Ellis (27)".

The evidence gathered by authorities including phone and online chat records shows that they made more than £300,000 from their fraud scheme. However, the officers believe it could be much higher , possibly more than £1million ($1.6m).

According to the National Crime Agency report, the fraudsters targeted innocent job hunters with fake job ads. Those who responded to the ads were sent a link via email asking them to complete an application form. Once the user clicks the link , it inadvertently install malware in victim's system.

The malware is capable of recording keystrokes and capturing victim's financial and personal data.

The compromised information is used by the fraudsters to get a new credit and debit cards, pin numbers.

The crooks will remain in custody and expected to be sentenced on Thursday 14 November.

Mumbai Police salary accounts hacked, Money withdrawn in Greece


Cybercriminals have reportedly targeted the Salary accounts of Mumbai Police and managed to withdraw money from their account.

According to NDTV report, cybercriminals have managed to withdraw money from Axis bank accounts of at least 14 Policemen from ATMs in Greece.

It appears hackers in Greece have done this heist by cloning ATM cards of Policemen in Mumbai.

At this time, there is no further information about how much money has been withdrawn and how many policemen have been affected by this heist.

The Mumbai police has formed a team to investigate the hack and bank has been asked to investigate.

Accused SpyEye Virus creator extradited from Thailand to US


An Algerian man who is believed to be the creator of the infamous Banking Trojan "SpyEye" was extradited from Thailand to the United States to face charges.

Hamza Bendelladj, 24-year-old, also known as Bx1, will face charges for allegedly playing a role in developing, marketing ,distributing and controlling the SpyEye virus, according to FBI report.

SpyEye is a Banking Trojan(similar to Zeus virus) that steals confidential personal data and finance information such as online banking credentials , credit card information.

He was arrested at Suvarnabhumi Airport in Bangkok, Thailand, on Jan 5, while he was in transit from Malaysia to Egypt.

If convicted, he will face a maximum sentence of up to 30 years in prison for conspiracy to commit wire and bank fraud; up to 20 years for each wire fraud count; up to five years for conspiracy to commit computer fraud; up to five or 10 years for each count of computer fraud; and fines of up to $14 million.

Hackers breached Industrial heating system using backdoor


Earlier this year, Hackers breached the Industrial Control System (ICS) network of a New Jersey air conditioning company by exploiting a backdoor vulnerability in the system, according to an FBI memo(info.publicintelligence.net/FBI-AntisecICS.pdf).

The hackers first breached the company’s ICS network by exploiting the vulnerabilities in Tridium Niagara ICS system , that allowed access to the main control mechanism for the company's internal heating, ventilation, and air conditioning (HVAC) units.

According to the memo, the security breach occurred in February and March 2012 , few weeks after @ntisec posted a tweet indicating that hackers were targeting SCADA, and something had to be done to address SCADA vulnerabilities.

The company used the Niagara system not only for its own HVAC system, but also installed it for customers, which included banking institutions and other commercial entities.

Although the controller for the system was password protected in general, the backdoor through the IP address apparently required no password and allowed direct access to the control system. The link posted by the hacktivist provided the same level of access to the company's control system as the password-protected administrator login.

The logs from controller showed hackers has gained access to the system from multiple unauthorized international and US-based IP addresses.