U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails

"Even though Westbrook took multiple steps to conceal his identity – including using anonymous email accounts, VPN services, and utilizing bitcoin – the Commission's advanced data analytics, crypto asset tracing, and technology can uncover fraud even in cases involving sophisticated international hacking," Jorge G. "On at least five occasions, Westbrook gained unauthorized access to Office 365 email accounts belonging to corporate executives employed by certain U.S.-based companies to obtain non-public information, including information about impending earnings announcements," the DoJ said. The Securities and Exchange Commission (SEC) said Westbrook deceptively obtained the sensitive information from five public companies in advance of at least 14 earnings announcements by resetting the passwords of those executives' accounts. According to the court documents, Westbrook is believed to have executed a fraudulent scheme between January 2019 and May 2020 that allowed him to generate millions in profits by gaining unauthorized access to Microsoft 365 accounts belonging to corporate executives. Each count of computer fraud has a maximum potential penalty of five years in prison and a maximum fine of either $250,000 or twice the gain or loss from the offense, whichever is greatest. Westbrook's securities fraud count carries a maximum potential penalty of up to 20 years in prison and a fine of $5 million. Robert Westbrook of London was arrested last week and is expected to be extradited to the U.S. to face charges related to securities fraud, wire fraud, and five counts of computer fraud. The wire fraud charges could rack up another maximum sentence of up to 20 years in prison and a fine of either $250,000, or twice the gain or loss from the offense, whichever is greatest. "On several occasions, Westbrook implemented auto-forwarding rules designed to automatically forward content from the corporate executives' compromised email accounts to email accounts controlled by Westbrook," the DoJ noted.

This Cyber News was published on thehackernews.com. Publication date: Tue, 01 Oct 2024 03:43:05 +0000


Cyber News related to U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails

Enhancing Organisational Security: A Comprehensive Guide to Insider Risk Management Courses - In a world increasingly aware of internal security threats, the necessity for comprehensive insider risk management courses has never been more crucial. Astonishingly, up to 90% of organisations acknowledge their vulnerability to insider attacks, ...
11 months ago Securityboulevard.com
Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators - Cybersecurity teams work extensively to keep external attackers out of their organization's IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as ...
1 year ago Cybersecurity-insiders.com
Key Takeaways from the Gartner® Market Guide for Insider Risk Management - Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. The report reveals several key findings about ...
1 year ago Securityboulevard.com
Binary Options Trading Signals: A Deep Dive - Binary options trading, a form of financial trading where the payout is either a fixed amount or nothing at all, has seen significant growth in popularity. Central to this growth is the development and use of sophisticated trading signals. These ...
11 months ago Feeds.dzone.com
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
9 months ago Securityboulevard.com
DTEX Systems Appoints Mandiant Global CTO Marshall Heilman As CEO - PRESS RELEASE. SAN JOSE, Calif.- December 5, 2023 - DTEX Systems, the global leader for insider risk management, today announced the appointment of Marshall Heilman as CEO. In this role, Heilman will drive its mission to proactively protect global ...
1 year ago Darkreading.com
Hacker spins up 1 million virtual servers to illegally mine crypto - A 29-year-old man in Ukraine was arrested this week for using hacked accounts to create 1 million virtual servers used to mine $2 million in cryptocurrency. As announced today by Europol, the suspect is believed to be the mastermind behind a ...
11 months ago Bleepingcomputer.com
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses - Automating mundane tasks and driving data-driven decisions, big data enables businesses to make better decisions and drive transformation. The use of AI has been shown as an effective way of streamlining operations and enhancing security measures, ...
11 months ago Cysecurity.news
Microsoft releases first Windows Server 2025 preview build - Microsoft has released Windows Server Insider Preview 26040, the first Windows Server 2025 build for admins enrolled in its Windows Insider program. This build is the first pushed for the next Windows Server Long-Term Servicing Channel Preview, which ...
10 months ago Bleepingcomputer.com
U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails - "Even though Westbrook took multiple steps to conceal his identity – including using anonymous email accounts, VPN services, and utilizing bitcoin – the Commission's advanced data analytics, crypto asset tracing, and technology can ...
2 months ago Thehackernews.com
From IT Pro to Swiftie, Scott Sardella's Winning Big with Cisco Insider Advocates - Cisco's advocacy community, Cisco Insider, brings our customers together and provides a way for them to make powerful connections, expand their professional and personal networks, and learn from top experts in the field. The support from Cisco TAC ...
6 months ago Feedpress.me
US arrests suspects behind $73M 'pig butchering' laundering scheme - In pig butchering scams, criminals approach targets using various messaging apps, dating platforms, or social media platforms to build trust and introduce them to investment schemes that help them drain the victims' cryptocurrency wallets. Instead of ...
7 months ago Bleepingcomputer.com
Hacking Protected Java-Based Programs - This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from ...
11 months ago Feeds.dzone.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
10 months ago Gbhackers.com
Hacker charged for breaching 5 companies for insider trading - “Even though Westbrook took multiple steps to conceal his identity – including using anonymous email accounts, VPN services, and utilizing bitcoin – the Commission’s advanced data analytics, crypto asset tracing, and ...
2 months ago Bleepingcomputer.com
Hacker Conversations: Chris Evans, Hacker and CISO - Chris Evans is CISO and chief hacking officer at HackerOne. SecurityWeek's Hacker Conversations series seeks to understand the mind and motivations of hackers by talking to hackers. Evans challenges the common perception of both hackers and their ...
5 months ago Securityweek.com
Data firm execs convicted for helping fraudsters target the elderly - A former senior executive and former sales manager of Epsilon Data Management LLC were convicted of selling data of millions of Americans to perpetrators of mail fraud schemes. As announced late last week by the U.S. Department of Justice, the two ...
5 months ago Bleepingcomputer.com
US SEC's X account hacked to announce fake Bitcoin ETF approval - The X account for the U.S. Securities and Exchange Commission was hacked today to issue a fake announcement on the approval of Bitcoin ETFs on security exchanges. The announcement came this afternoon in a now-deleted tweet from the SEC's hacked X ...
11 months ago Bleepingcomputer.com
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
1 year ago Bleepingcomputer.com
Misconfigured Firebase Instances Expose 125 Million User Records - Hundreds of websites misconfigured Google Firebase, leaking more than 125 million user records, including plaintext passwords, security researchers warn. It all started with the hacking of Chattr, the AI hiring system that serves multiple ...
9 months ago Securityweek.com
Four charged for laundering funds in $80 million pig butchering scheme - Four men have been charged in U.S. federal court for their alleged involvement in a so-called pig butchering scheme that stole more than $80 million from unwitting victims. Zhang and Walker were arrested on Tuesday and appeared in a Los Angeles ...
1 year ago Therecord.media
Belgian charged with smuggling military tech to Russia, PRC The Register - A Belgian man has been arrested and charged for his role in a years-long smuggling scheme to export military-grade electronics from the US to Russia and China. Belgian law enforcement detained Hans Maria De Geetere, 61, and five others for ...
1 year ago Go.theregister.com
FBI Charges North Korean Hackers Over $100 Million Stolen in Crypto Hack - The FBI has recently charged a North Korean hacker in connection with the Harmony crypto hack from which the hacker allegedly stole over $100 million. The hacker, Jon Chang Hyok, is a member of the North Korean military intelligence agency, the ...
1 year ago Bleepingcomputer.com
Top Characteristics of a QR Code Phishing Email - As campaigns using QR codes grow in size and complexity it is important to track not just the QR codes themselves, but also the context of the emails delivering the QR codes. Others use images embedded in the email or QR codes rendered from external ...
1 year ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)