Friday, March 29, 2024

Man Hacked into Jail Computer Network to Change his Friend Release Date

Ann Arbor, Michigan, hacked into the Washtenaw County Jail Computer network to change the release and have his friend released early.

Konrads Voits aged 27 was arrested earlier this year by FBI and pleaded guilty for damaging protected County computer network in Federal Court.

How Voits Get access to Computer networks

As indicated by court records, Viot conducted a Social Engineering attacks via both email and phone calls to Washtenaw County employees.

Social Engineering attacks to trap the employees and make them install malware on their system. So that he obtain complete control over the system and can force any changes.

He targetted Washtenaw staff “Daniel Greene” and requesting to help in pulling the records; he also registered the domain ewashtenavv.org, which resembles same like Washtenaw official website ewashtenaw.org.

Also Read Verizon Partner Exposed Around 14 Million’s of Customer Accounts Sensitive Data Online

But his email spear-phishing campaigns ended up unsuccessfully. Later in mid-February Viot started calling jail employees and claimed that he is the IT manager of County computer network and ask them to download and install specific executables to upgrade the system.

Some of the employees fall into the trap and installs the malware which allows Viot to gain access to their computer network system.Once he gained access took the names, addresses, emails, and passwords of many former and present Washtenaw County employees, Plea reads.

Washtenaw County spends numerous extra hours in addressing the breach and leads to at least $235,488 loss. Voits is confronting a most extreme punishment under government law of 10 years’ detainment and a $250,000 fine.

“Cyber intrusions affect individuals, businesses, and governments. Computer hackers should realize that unlawfully entering another’s computer will result in a felony conviction and a prison sentence,” Lemisch said.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles