Tuesday, December 3, 2024
HomeSecurity NewsMan Hacked into Jail Computer Network to Change his Friend Release Date

Man Hacked into Jail Computer Network to Change his Friend Release Date

Published on

SIEM as a Service

Ann Arbor, Michigan, hacked into the Washtenaw County Jail Computer network to change the release and have his friend released early.

Konrads Voits aged 27 was arrested earlier this year by FBI and pleaded guilty for damaging protected County computer network in Federal Court.

How Voits Get access to Computer networks

As indicated by court records, Viot conducted a Social Engineering attacks via both email and phone calls to Washtenaw County employees.

Social Engineering attacks to trap the employees and make them install malware on their system. So that he obtain complete control over the system and can force any changes.
- Advertisement - SIEM as a Service

He targetted Washtenaw staff “Daniel Greene” and requesting to help in pulling the records; he also registered the domain ewashtenavv.org, which resembles same like Washtenaw official website ewashtenaw.org.

Also Read Verizon Partner Exposed Around 14 Million’s of Customer Accounts Sensitive Data Online

But his email spear-phishing campaigns ended up unsuccessfully. Later in mid-February Viot started calling jail employees and claimed that he is the IT manager of County computer network and ask them to download and install specific executables to upgrade the system.

Some of the employees fall into the trap and installs the malware which allows Viot to gain access to their computer network system.Once he gained access took the names, addresses, emails, and passwords of many former and present Washtenaw County employees, Plea reads.

Washtenaw County spends numerous extra hours in addressing the breach and leads to at least $235,488 loss. Voits is confronting a most extreme punishment under government law of 10 years’ detainment and a $250,000 fine.

“Cyber intrusions affect individuals, businesses, and governments. Computer hackers should realize that unlawfully entering another’s computer will result in a felony conviction and a prison sentence,” Lemisch said.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...

ElizaRAT Exploits Google, Telegram, & Slack Services For C2 Communications

APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a...

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...