Sunday, April 13, 2025
HomeCyber Security NewsJunior School Student Indicted for Infecting Computers With Malware

Junior School Student Indicted for Infecting Computers With Malware

Published on

SIEM as a Service

Follow Us on Google News

Fukui Prefectural Police have indicted a 15-year-old junior high school student from Saitama Prefecture for allegedly creating and distributing malware.

The young suspect, who was only 14 at the time of the incidents, faces charges under Japan’s Unauthorized Access Prevention Act for storing and deploying unauthorized electromagnetic records of instructions.

According to Fukui Police Station and the Cyber Crime Division, the suspect admitted to the allegations, stating, “I learned how to create computer viruses by myself, and I wanted to test my skills.”

- Advertisement - Google News

The case has raised alarm about the accessibility of hacking tools and knowledge among young individuals.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Details of the Incident

According to the Fukuishimbun report, the boy is accused of infecting a fellow teenager’s computer in Fukui Prefecture on April 1.

Reports indicate that both teenagers were connected via an online platform. The malware enabled the suspect to extract and store the victim’s web service IDs and passwords on his own computer.

Additionally, the student was found to have stored another piece of malware on his device on October 11.

Authorities revealed that the victim’s personal information, including their name and address, had been posted on a social networking site.

Concerned about potential misuse, the victim reached out to the police for assistance in April, which led to the investigation and eventual identification of the suspect.

While the suspect claimed his actions were motivated by curiosity and a desire to test his skills, the case has highlighted the growing challenges of cybercrime enforcement in the digital era.

As the legal process unfolds, it underscores the importance of fostering responsible technology use among young people to prevent future cases of cyber misconduct.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...