Friday, April 18, 2025
HomeCyber Security NewsJunior School Student Indicted for Infecting Computers With Malware

Junior School Student Indicted for Infecting Computers With Malware

Published on

SIEM as a Service

Follow Us on Google News

Fukui Prefectural Police have indicted a 15-year-old junior high school student from Saitama Prefecture for allegedly creating and distributing malware.

The young suspect, who was only 14 at the time of the incidents, faces charges under Japan’s Unauthorized Access Prevention Act for storing and deploying unauthorized electromagnetic records of instructions.

According to Fukui Police Station and the Cyber Crime Division, the suspect admitted to the allegations, stating, “I learned how to create computer viruses by myself, and I wanted to test my skills.”

- Advertisement - Google News

The case has raised alarm about the accessibility of hacking tools and knowledge among young individuals.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Details of the Incident

According to the Fukuishimbun report, the boy is accused of infecting a fellow teenager’s computer in Fukui Prefecture on April 1.

Reports indicate that both teenagers were connected via an online platform. The malware enabled the suspect to extract and store the victim’s web service IDs and passwords on his own computer.

Additionally, the student was found to have stored another piece of malware on his device on October 11.

Authorities revealed that the victim’s personal information, including their name and address, had been posted on a social networking site.

Concerned about potential misuse, the victim reached out to the police for assistance in April, which led to the investigation and eventual identification of the suspect.

While the suspect claimed his actions were motivated by curiosity and a desire to test his skills, the case has highlighted the growing challenges of cybercrime enforcement in the digital era.

As the legal process unfolds, it underscores the importance of fostering responsible technology use among young people to prevent future cases of cyber misconduct.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...