Tuesday, February 11, 2025
HomeCyber Security NewsFormer Yahoo Employee Pleads Guilty for Hacking into 6,000 Yahoo accounts in...

Former Yahoo Employee Pleads Guilty for Hacking into 6,000 Yahoo accounts in Search for Private Images

Published on

SIEM as a Service

Follow Us on Google News

Former Yahoo employee pleads guilty for hacking into 6,000 Yahoo users accounts in search of personal records such as private images and videos of account holders.

Reyes Daniel Ruiz admitted in federal court in San Jose for hacking Yahoo accounts, he cracked user passwords and accessed Yahoo internal systems to compromise the Yahoo accounts.

He targeted the email accounts of a young woman, including his personal friends and work colleagues. Ruiz copies the images found in the personal account without their permission and stored the data at this home,” reads plea agreement.

By having access to the Yahoo accounts he managed to get access to the users iCloud, Facebook, Gmail, DropBox and other online accounts in search of private images and videos.

He did this by requesting the password reset on those sites and the password reset emails received on the compromised Yahoo accounts. By having two-factor authentication these types of attacks can be avoided.

Once Ruiz’s employer Yahoo detected the suspicious activity, he admitted that he destroyed the computer that the data were stored.

The 34-year-old Ruiz was charged one count of Computer Intrusion and one count of Interception of a Wire Communication. He may get five years imprisonment and a restitution fine of $250,000.

Now he is released following the $200,000 bond and his plea was scheduled for February 3, 2020, in front of Honorable Edward J. Davila, U.S. District Court Judge, in San Jose.

It is important to protect the data against insider threats, employes acting maliciously toward the company is risky, the organization should put the right precautions in place.

Based on his Linkedin profile the former Yahoo employee Reyes Daniel Ruiz worked at Okta, Inc between October 2018 to July 2019. Ruiz was charged in April, after that the company investigated and fired him.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals.Among...

Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely

IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its...

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals.Among...

Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely

IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its...