DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Oilpro.Com Founder Charged In Manhattan Federal Court With Hacking Into Competitor’s Computer System

Posted on March 30, 2016 by Dissent

DAVID W. KENT, the founder of professional networking website Oilpro.com (“Oilpro”), was arrested for charges relating to computer hacking and wire fraud.  The charges stem from KENT’s alleged role in repeatedly hacking into a competitor’s database to steal customer information and attempting to sell Oilpro to the same company whose database KENT had hacked.  KENT was arrested by FBI agents in Spring, Texas, this morning.

Manhattan U.S. Attorney Preet Bharara said:  “As alleged, David Kent hacked into a competitor’s database and stole information from over 700,000 customer accounts.  Later he allegedly tried to use the proprietary information to defraud that same company. Thanks to the efforts of our law enforcement partners at the FBI, David Kent will now be held to account for his criminal conduct.”

FBI Assistant Director-in-Charge Diego Rodriquez said:   “In this case, a profitable business was sold for approximately $51 million.  Allegedly, however, instead of relinquishing control of his former company, subject David Kent continued to illegally access data and information from his former business to help benefit a competing business he formed after the sale.  Unauthorized access to a protected computer system is a federal crime.  The FBI will investigate and bring to justice criminal actors who commit computer intrusions, whether the unauthorized access is to a personal computer or a corporate server.”

According to the allegations in the Complaint unsealed today in Manhattan federal court[1]:

In or about March 2000, KENT founded a website (“Website-1”) that provides, among other things, networking services to professionals working in the oil and gas industry.  Website-1 allows its members to create profiles, which include personal and professional information.  As part of their profiles, members can also upload their resumes.  The profiles are contained in a database maintained by Website-1 (the “Members Database”).  Members are assigned login credentials (i.e. usernames and passwords) when they create their profiles.  Members use these login credentials to access their profiles.

In or around August 2010, KENT sold Website-1 for approximately $51 million to a publicly-traded company headquartered in New York, NY (“Company-1”).  KENT entered into an employment agreement with Company-1 and agreed to continue to serve as the President of Website-1 after the acquisition.  However, KENT left Website-1 in September 2011 and launched Oilpro in October 2013.  Like Website-1, Oilpro provides networking services to professionals working in the oil and gas industry.  Oilpro is headquartered in Houston, Texas.

Between October 2013 and February 2016, KENT conspired to access information belonging to Website-1 without authorization and to defraud Company-1.  KENT accessed the Website-1 Members Database without authorization and stole customer information, including information from over 700,000 customer accounts.  KENT then exploited this information by inviting Website-1’s members to join Oilpro.  Similarly, one of Kent’s employees at Oilpro who previously worked for Website-1 (“CC-1”) accessed information in Website-1’s Google Analytics account without authorization and forwarded the information to KENT.  In the meantime, KENT attempted to defraud Company-1 by misrepresenting during discussions about a potential acquisition of Oilpro by Company-1 that Oilpro had increased its membership through standard marketing methods.

*                *                *

KENT, 40, of Spring, Texas, has been charged with one count of conspiracy to commit computer hacking and wire fraud, which carries a maximum term of five years in prison, and one count of wire fraud, which carries a maximum term of 20 years in prison.  The maximum potential sentences are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge.

Mr. Bharara praised the investigative work of the FBI.  Mr. Bharara also thanked the Office of International Affairs and the United Kingdom’s National Cyber Crime Unit (NCCU), and noted that the investigation is continuing.

This case is being handled by the Office’s General Crimes Unit.  Assistant United States Attorneys Sidhardha Kamaraju and Andrew K. Chan are in charge of the prosecution.

The charges contained in the Complaint are merely accusations and the defendant is presumed innocent unless and until proven guilty.


[1] As the introductory phrase signifies, the entirety of the text of the Complaint and the description of the Complaint set forth herein constitute only allegations, and every fact described should be treated as an allegation.

SOURCE: U.S. Attorney’s Office, Southern District of New York

Category: Business SectorHackInsiderU.S.

Post navigation

← Norfolk Admirals’ data breach exposes customers’ names, other information
Cumbrian hacker who attacked Moonpig avoids prison →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.