Convicted cybercriminal hacks prison's computer systems


Helen Martin

Virus Bulletin, UK
Editor: Helen Martin


Epic fail as convicted hacker enrolls in IT class for inmates.

It has been revealed that a convicted cybercriminal hacked into a UK prison computer system after participating in an IT class for inmates. 21-year-old Nicholas Webber was sentenced to five years imprisonment in 2011 for running the GhostMarket.Net website, which sold stolen credit card details as well as offering tutorials on how to commit identity theft and online scams. It transpires that while serving his sentence at HMP Isis in South London, Webber enrolled in the prison’s IT course, and that during the course he managed to hack into the prison’s computer systems. The incident has come to light after the leader of the course – who subsequently lost his job – instigated a claim for unfair dismissal, arguing that it was not his decision to put Webber in his class, and that he was not aware that Webber was a convicted hacker. A spokesperson for the Prison Service asserted that the computer system used in the IT classes was a closed network and that ‘no access to personal information or wider access to the Internet or other prison systems would have been possible.’



Latest articles:

VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

The number of incidents attributed to the Lazarus Group, a.k.a. Hidden Cobra, has grown rapidly since its estimated establishment in 2009. In this paper, ESET researchers Peter Kalnai and Michal Poslusny look at various cells within the group, that…

VB2018 paper: Fake News, Inc.

As the world grapples with massive disinformation campaigns waged by the intelligence agencies of hostile nations, we should not forget that such activities are not limited to the purview of the Bears or Pandas of the world, and that even relatively…

Alternative communication channel over NTP

Nikolaos Tsapakis explores Network Time Protocol (NTP) as an alternative communication channel, providing practical examples, code, and the basic theory behind the idea.

VB2018 paper: Under the hood: the automotive challenge

In an average five-year-old car, there are about 30 different computers on board. In an average new car, there are double that number, and in some cases up to 100. That’s the size of network an average SMB would have, only there’s no CIO/CISO, and…

VB2018 paper: Android app deobfuscation using static-dynamic cooperation

Malicious Android applications are quite common, and can even be found from time to time in the Google Play Store. Thus, a lot of work has been done in both industry and academia on Android app analysis, and in particular, static code analysis. One…

Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.