• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Americans Fined After Hacking for Foreign Government

You are here: Home / General Cyber Security News / Americans Fined After Hacking for Foreign Government
September 15, 2021

Three former users of the United States military or United States Intelligence Group (USIC) have been fined for offering hacking-connected companies to a overseas authorities. 

United States citizens, 49-year-outdated Marc Baier and 34-year-previous Ryan Adams, and 40-year-previous previous US citizen Daniel Gericke were investigated by the Division of Justice (DOJ) over promises that they had violated U.S. export management, laptop fraud, and obtain unit fraud legal guidelines. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On September 7, the a few adult males entered into a deferred prosecution agreement (DPA) with the DOJ that calls for them to pay out $1,685,000 in penalties. The agreement also spots limits on the foreseeable future actions and employment of the three adult males.

According to courtroom documents, between 2016 and 2019, all 3 defendants labored as senior professionals at a company primarily based in the United Arab Emirates (UAE) that done and supported hacking for the gain of the UAE authorities. 

Expert services carried out by the defendants involved the provision of assist, route and supervision in the development of complex “zero-click” laptop-hacking and intelligence-gathering methods able of compromising a gadget devoid of any action becoming taken by the target.

The zero-click on exploits had been afterwards deployed by other workforce at the UAE-based mostly organization to illegally attain and use access qualifications for on line accounts issued by corporations in the United States. The exploits ended up even more used to receive unauthorized access to mobile telephones and pcs in the United States and about the world. 

The State Department’s Directorate of Defense Trade Controls (DDTC) knowledgeable the defendants on many events that the operate they were being doing was a “defense service” as described underneath the Intercontinental Traffic in Arms Laws (ITAR) and that they necessary a license from the State to give the solutions they ended up carrying out.

“This arrangement is the initial-of-its-variety resolution of an investigation into two distinct types of legal activity: providing unlicensed export-managed defense products and services in help of personal computer network exploitation, and a commercial firm building, supporting and functioning techniques especially created to make it possible for other folks to entry info without having authorization from personal computers all over the world, together with in the United States,” said Acting Assistant Lawyer General Mark J. Lesko for the Justice Department’s Nationwide Security Division.


Some elements of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Software Supply Chain Attacks Surge 650% in a Year
Next Post: Serious Flaw Found in HP OMEN Driver Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.