Ex-Yahoo employee admits trawling through user accounts for explicit content
More than 6,000 users compromised as defendant also accessed iCloud, Facebook and Gmail accounts
A former software engineer with Yahoo has pled guilty to hacking into approximately 6,000 user accounts, including those of his friends and colleagues, in order to search for explicit or sexual material.
Reyes Daniel Ruiz, 34, has been accused of hacking into thousands of Yahoo accounts through his work at the company in an attempt to find sexual images and videos from the account holders.
These were accounts primarily belonging to younger women, according to the US Attorney's Office for the Northern District of California.
Ruiz made copies of images and videos he found without permission, and stored the data at his home. He also admitted to taking this a step further and compromising the iCloud, Facebook, Gmail, Dropbox and other online accounts of the victims in order to search for more explicit photos and videos.
"In pleading guilty, Ruiz, a former Yahoo software engineer, admitted to using his access through his work at the company to hack into about 6,000 Yahoo accounts," the US Attorney's Office said.
"Ruiz cracked user passwords, and accessed internal Yahoo systems to compromise the Yahoo accounts.
"After his employer observed the suspicious account activity, Ruiz admitted to destroying the computer and hard drive on which he stored the images."
Ruiz was indicted on 4 April and charged with one count of Computer Intrusion, and one count of Interception of a Wire Communication, pleading guilty to the latter. The maximum penalty for each count is five years in prison and a fine of $250,000.
Although these laws apply in the US only, one piece of legislation that serves as the equivalent in the UK is the Computer Misuse Act 1990, which is designed to prevent information theft from computer systems.
Research from 2016 found that more than a third of employees were routinely violating this law, although not to the extent of Ruiz's offences.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download