Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Wasn't he the guy that used tar for the leaked folder of data, but the tar included his user folder which contained his legal name?




Yes, the tar command claims another victim. Tested while inside /var/www/html/vastaamo and then stuffed it in the crontab.

  $ tar cvf /var/www/html/vastaamo/vastaamo.tar . -C /var/www/html/vastaamo --exclude vastaamo.tar
For reference:

  -C, --directory=DIR
         Change to DIR before performing any operations.  This
         option is order-sensitive, i.e. it affects all options
         that follow.

It's in the article. Not sure it had his name, but certainly his family name since he looked for records concerning his relatives.

The queries appear to have been looking for me specifically, filtering by date of birth. That wouldn't be a good way to find my relatives.

Damn, some other group trying to cause trouble for you?

I doubt it. I think it's just cops doing shitty work under pressure and then trying to cover it up.

Automating the upload of a home folder to the darkweb in the middle of an extortion attempt would be pretty weak for a "legendary" hacker.

whoopsie :D


Ah yes-- I first heard of this via an entertaining video about it, "One Drunken Mistake Destroyed Finland's Scummiest Hacker", see below.

https://www.youtube.com/watch?v=pyCcvPfT_jU


The big problem with this video is that it's basically entirely based on google translated tabloid articles.

The results are what you might expect if you decided to just use dailymail.co.uk as a source, similar to the creator of malicious trojan virus Python being arrested https://www.dailymail.co.uk/news/article-2124114/Computer-ha...

>Pearson coded trojan viruses, called Zeus, SpyEye and Python, to automatically scour the internet in search of personal details.


It’s really not a good idea to be posting about your case when it hasn’t even been resolved yet.

I do have access to excellent legal advice, strive to live by it.

> I do have access to excellent legal advice, strive to live by it.

Says the guy that went on a news broadcast (unmasked) to brag about hacking Sony.

https://www.youtube.com/watch?v=fPX8yCBdIZ8


I was 17 at the time :) And FWIW, the whole joke there was that neither me nor the other guy being interviewed had anything at all to do with the attacks on PSN and XBL.

Just wanted to say hi, I was pretty young at the time but I remember the whole thing with the PSN shit and the Keemstar interviews :DDdddd

good times man.

But the thing about not having any devices seized, is that real?

Some people I know have had run-ins with the NBI, and the first thing they do is seize your computers for like a year+?

If that's true then that's really weird...


>But the thing about not having any devices seized, is that real?

It's real and just as bizarre as it sounds. You'd think that'd be the #1 thing you'd want in any serious investigation.


Well, judging by this thread, it doesn’t seem like it.

Yes, I'm sure my comments here are just full of terribly damaging stuff.

Not sure what the theory here is. Am I supposed to worry about the judges stalking me online and reading my HN comments professing innocence?

The prosecutors couldn't, and wouldn't even want to use anything I've written here, especially considering the trial is over and they can't just file new evidence.


No, that did not actually happen.

What did happen, then?

Someone else leaked a copy of a shared throwaway VM used for hacks. Akin to https://www.thc.org/segfault/, but longer lived and potentially tens of people with access.

The leaked home folder data doesn't really tie that VM to anyone, which is natural given that it seems to have mostly been used to run headless hacking tools and inspect their output.

The idea that I'm linked to this VM comes from the ridiculous idea that lazy hackers would not share SSH key files in order to control access to groups of virtual machines. I.e. if a SSH key fingerprint is at one point tied to me, that key must also still belong to me even when used from a internet connection belonging to another person in another country with a similar track record as me.

In court we had long debates about whether or not hackers could actually be so lazy as to violate best practices by sharing private key material, the lower court rejected such an idea as incredible and found me guilty.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: