• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
former ubiquiti employee gets 6 years in jail for $2

Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case

You are here: Home / General Cyber Security News / Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case
May 15, 2023

A former employee of Ubiquiti has been sentenced to six years in jail soon after he pleaded guilty to posing as an anonymous hacker and a whistleblower in an attempt to extort just about $2 million truly worth of cryptocurrency though working at the organization.

Nickolas Sharp, 37, was arrested in December 2021 for working with his insider accessibility as a senior developer to steal private data and sending an anonymous email asking the network technology service provider to pay 50 bitcoin (about $2 million at the time) in exchange for the siphoned information and facts.

Ubiquiti, having said that, did not produce to the ransom try and as an alternative looped in law enforcement, which inevitably recognized Sharp as the hacker following tracing a VPN connection to a Surfshark account purchased with his PayPal account.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“Sharp repeatedly misused his administrative access to download gigabytes of private information from his employer,” the U.S. Justice Section said, incorporating he “modified session file names to try to make it show up as if other coworkers have been responsible for his destructive periods.”

The Oregon-dependent defendant, in addition to supplying bogus statements denying any know-how of the extortion plan, tampered with log retention policies and other session file names in purchase to conceal his unauthorized action on the company’s network.

Sharp, who was utilized at Ubiquiti from August 2018 via late March 2021, pleaded guilty earlier this February to falsely spreading the news that the firm experienced been hacked by an unknown perpetrator who had acquired administrator entry to the firm’s AWS accounts.

Future WEBINARLearn to Quit Ransomware with Genuine-Time Protection

Join our webinar and understand how to stop ransomware attacks in their tracks with serious-time MFA and assistance account security.

Preserve My Seat!

The fabricated security breach led to Ubiquiti’s stock value sliding somewhere around 20% in March 2021, triggering it to get rid of above $4 billion in current market capitalization.

In addition to the prison expression, Sharp has been “sentenced to 3 decades of supervised launch and requested to pay restitution of $1,590,487 and to forfeit own home used or meant to be employed in link with these offenses.”

Observed this report exciting? Follow us on Twitter  and LinkedIn to examine far more exclusive content we post.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Shift Everywhere: Download This Ultimate Guide to Integrating AppSec in DevOpswww.checkmarx.comDevSecOps / AppSecCheckmarx One, it's an investment in growth.Drive sales with the most trusted AppSec platform.
Next Post: CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware clr sqlshell malware targets ms sql servers for crypto mining»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.