{"id":4113,"date":"2014-09-17T12:30:55","date_gmt":"2014-09-17T16:30:55","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4113"},"modified":"2019-11-22T15:40:24","modified_gmt":"2019-11-22T10:10:24","slug":"busted-august-2014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/busted-august-2014\/4113\/","title":{"rendered":"Busted! Top prosecutions of August"},"content":{"rendered":"<p>The final month of summer wasn\u2019t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.<\/p>\n<p><strong>Arrested for distributing child pornography<\/strong><\/p>\n<p>Modern technology continues to become more and more useful in helping law enforcement find cybercriminals. Sometimes it is not even necessary to involve people in the process\u2014a piece of software will handle everything, so all the police have to do is bring the criminal to court. That\u2019s what happened to 20-year-old Tyler Hoffman and 31-year-old Abraham Gordon, who had to answer to child pornography charges.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084555\/TylerHoffman-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6040\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084555\/TylerHoffman-1.png\" alt=\"TylerHoffman (1)\" width=\"200\" height=\"243\"><\/a>The first case involved Microsoft and its software called PhotoDNA, which can identify images of children in sexually explicit photos. Thanks to that technology, Hoffman\u2019s Microsoft email account was flagged when he uploaded child pornography images on his cell phone. This was reported to the National Center for Missing and Exploited Children, also known as NCMEC, which then alerted the police.<\/p>\n<p>Abraham Gordon\u2019s crime was also made known to police thanks to an email analyzing technology, which in this case was developed by Google. After Gordon uploaded five pornographic images of children, the automatic system flagged his email, and Google then alerted the NCMEC, which notified the police.<\/p>\n<p>Chances are both men will spend several years in jail.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Two men were arrested for child porn thanks to Microsoft and Google! #security #busted<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FVH1J&amp;text=Two+men+were+arrested+for+child+porn+thanks+to+Microsoft+and+Google%21+%23security+%23busted\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Two Russians arrested for hacking<\/strong><\/p>\n<p>The Russian police arrested two young hackers suspected of accessing a computer system without authorization. Prosecutors say that both men were not simply \u2018having fun\u2019 by hacking emails and social network accounts, but rather, they were making money. Anyone who wanted someone\u2019s account to be hacked had to pay these cybercriminals around $100-$300. It\u2019s stated that the hackers had 30 to 40 clients per month, including private individuals as well as companies that were interested in competitors\u2019 confidential information. Both young criminals are likely to receive a substantial fine and\/or some jail time.<\/p>\n<div class=\"pullquote\">Modern technology continues to become more and more useful in helping law enforcement find cybercriminals.<\/div>\n<p><strong>16 arrested after a massive data breach in South Korea<\/strong><\/p>\n<p>Authorities with the South Jeolla Provincial Police Agency announced that it had apprehended a 24-year-old, known simply as Kim, in addition to15 others connected to a breach in South Korea. The breach may have impacted as many as 27 million citizens, roughly 70 percent of the nation\u2019s population. Officials claim that the 16 individuals illegally circulated information that pertains to millions of South Koreans between the ages of 15 and 65. Police claim Kim acquired the information (220 million records in total) from a Chinese hacker he met online in 2011. That hacker allegedly stole the information from online registrations for online gaming sites, movie ticketing sites and ringtone download sites. The information contains individuals\u2019 names, resident registration numbers, and account names and passwords. Officials claim they\u2019re continuing to investigate the incident and are in the midst of pursuing seven other suspects.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The final month of summer wasn\u2019t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.<\/p>\n","protected":false},"author":214,"featured_media":4114,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[672,93,78,43,97],"class_list":{"0":"post-4113","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-busted","9":"tag-cybercriminals","10":"tag-hackers","11":"tag-privacy","12":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/busted-august-2014\/4113\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/busted-august-2014\/4017\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/busted-august-2014\/4523\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/busted-august-2014\/4768\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/busted-august-2014\/5173\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/busted-august-2014\/6038\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/busted-august-2014\/4779\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/busted-august-2014\/5173\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/busted-august-2014\/6038\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/busted-august-2014\/6038\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/busted\/","name":"Busted"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4113"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4113\/revisions"}],"predecessor-version":[{"id":17933,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4113\/revisions\/17933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4114"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}