Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Xbox Hacker Responsible for $100Mn Heist Pleads Guilty

21/01/2015 by Sharon Shahzad

W1siziisijiwmtuvmdevmjevmtcvmjivmzmvnjuwl3hib3hfb25lx3npz24uanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

A third member of the international hacking ring responsible for stealing between $100 and $200 million in intellectual property and other proprietary data from Microsoft’s Xbox gaming platform and others has pleaded guilty.

Nathan Leroux, 20, of Bowie, Md. admitted to conspiracy to commit computer intrusions and criminal copyright infringement. Leroux has been in custody since attempting to flee into Canada from Buffalo, N.Y., on June 16, 2014.  A sentencing hearing is set before U.S. District Judge Judge Gregory M. Sleet of the District of Delaware on May 14.

He and his compadres are accused of stealing software and data related to the Xbox One gaming console and Xbox Live online gaming system, which allegedly included source code, technical specifications and related information for Microsoft’s then-unreleased Xbox One gaming console; and intellectual property and proprietary data related to Xbox Live (Microsoft’s online multi-player gaming and media-delivery system). The idea was to build and sell a counterfeit version of the console before its release.

The ring is also accused of stealing a pre-release version of Epic’s video game, Gears of War 3; and a pre-release version of Activision’s uber-popular video game, Call of Duty: Modern Warfare 3. And, Leroux also admitted that he developed a software exploit that generated millions in in-game, virtual currency for Electronic Arts’ FIFA line of soccer games, which he then sold in bulk quantities on the black market.

The hacks took place between January 2011 and September 2012, according to the Feds.

In addition to Leroux, Sanadodeh Nesheiwat, 28, of Washington, NJ; David Pokora, 22, of Mississauga, Ontario, Canada; and Austin Alcala, 18, of McCordsville, Ind., were all charged in the 18-count superseding indictment returned by a federal grand jury in the District of Delaware on April 23, 2014 and unsealed in September.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/xbox-hacker-pleads-guilty/

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technology, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...