Ex-Yahoo employee admits trawling through user accounts for explicit content
More than 6,000 users compromised as defendant also accessed iCloud, Facebook and Gmail accounts
A former software engineer with Yahoo has pled guilty to hacking into approximately 6,000 user accounts, including those of his friends and colleagues, in order to search for explicit or sexual material.
Reyes Daniel Ruiz, 34, has been accused of hacking into thousands of Yahoo accounts through his work at the company in an attempt to find sexual images and videos from the account holders.
These were accounts primarily belonging to younger women, according to the US Attorney's Office for the Northern District of California.
Ruiz made copies of images and videos he found without permission, and stored the data at his home. He also admitted to taking this a step further and compromising the iCloud, Facebook, Gmail, Dropbox and other online accounts of the victims in order to search for more explicit photos and videos.
"In pleading guilty, Ruiz, a former Yahoo software engineer, admitted to using his access through his work at the company to hack into about 6,000 Yahoo accounts," the US Attorney's Office said.
"Ruiz cracked user passwords, and accessed internal Yahoo systems to compromise the Yahoo accounts.
"After his employer observed the suspicious account activity, Ruiz admitted to destroying the computer and hard drive on which he stored the images."
Ruiz was indicted on 4 April and charged with one count of Computer Intrusion, and one count of Interception of a Wire Communication, pleading guilty to the latter. The maximum penalty for each count is five years in prison and a fine of $250,000.
Although these laws apply in the US only, one piece of legislation that serves as the equivalent in the UK is the Computer Misuse Act 1990, which is designed to prevent information theft from computer systems.
Research from 2016 found that more than a third of employees were routinely violating this law, although not to the extent of Ruiz's offences.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now