DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana Man Pleads Guilty to Extensive Computer Hacking Scheme Involving Nearly 50 Victims

Posted on September 2, 2016 by Dissent

U.S. Attorney Kenneth A. Polite announced that BRADER YELVERTON, age 24, of Thibodaux, pled guilty on Tuesday to a one-count Bill of Information charging him with unauthorized access of a protected computer.

According to court documents, between about 2013 and December 2015, YELVERTON accessed the personal online accounts, including email, educational, social media, and “cloud” storage accounts of at least 49 individuals without their knowledge or authorization.  All of the individuals whose accounts YELVERTON accessed without authorization were individuals he knew.  The vast majority of the victims were females, as well as several of their significant others.

YELVERTON obtained access to an account by using publicly accessible information, or information he knew about the victim, to isolate the password for one of the accounts, usually his/her social media account.  YELVERTON then used the information contained in the social media account to obtain the password to other accounts of the victim.  Once he obtained access to the accounts, YELVERTON changed the passwords so that he could continue to access them. After YELVERTON obtained access to the accounts, he searched through them and obtained personal information of the victims, including, in some cases, sensitive photographs of the victims.

In the case of one victim, YELVERTON viewed not more than 380 pictures stored on her various online accounts.  After saving some of the pictures to his personal computer, YELVERTON uploaded at least two private, sensitive photographs of  the victim that he obtained from her private accounts onto an online anonymous image trading board that provides for state-specific and city-specific fora for individuals to upload, view, download, and trade images.  During the upload process, YELVERTON entitled the images using the first name and last initial of the victim, so that other visitors to the website could readily identify the victim.

If convicted, YELVERTON faces a maximum term of imprisonment of not more than five years in prison, followed by up to three years of supervised release, and a $250,000 fine.  U.S. District Judge Jay C. Zainey set sentencing for November 26, 2016.

SOURCE: U.S.A.O., Eastern District of Louisiana

Related: Download Brader Yelverton – Factual Basis.pdf


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
Category: HackU.S.

Post navigation

← Bitcoin Exchange BTC-E and BitcoinTalk Forum Breaches
Southwest Portland Dental notifies patients of Patterson Dental breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.