DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana Man Pleads Guilty to Extensive Computer Hacking Scheme Involving Nearly 50 Victims

Posted on September 2, 2016 by Dissent

U.S. Attorney Kenneth A. Polite announced that BRADER YELVERTON, age 24, of Thibodaux, pled guilty on Tuesday to a one-count Bill of Information charging him with unauthorized access of a protected computer.

According to court documents, between about 2013 and December 2015, YELVERTON accessed the personal online accounts, including email, educational, social media, and “cloud” storage accounts of at least 49 individuals without their knowledge or authorization.  All of the individuals whose accounts YELVERTON accessed without authorization were individuals he knew.  The vast majority of the victims were females, as well as several of their significant others.

YELVERTON obtained access to an account by using publicly accessible information, or information he knew about the victim, to isolate the password for one of the accounts, usually his/her social media account.  YELVERTON then used the information contained in the social media account to obtain the password to other accounts of the victim.  Once he obtained access to the accounts, YELVERTON changed the passwords so that he could continue to access them. After YELVERTON obtained access to the accounts, he searched through them and obtained personal information of the victims, including, in some cases, sensitive photographs of the victims.

In the case of one victim, YELVERTON viewed not more than 380 pictures stored on her various online accounts.  After saving some of the pictures to his personal computer, YELVERTON uploaded at least two private, sensitive photographs of  the victim that he obtained from her private accounts onto an online anonymous image trading board that provides for state-specific and city-specific fora for individuals to upload, view, download, and trade images.  During the upload process, YELVERTON entitled the images using the first name and last initial of the victim, so that other visitors to the website could readily identify the victim.

If convicted, YELVERTON faces a maximum term of imprisonment of not more than five years in prison, followed by up to three years of supervised release, and a $250,000 fine.  U.S. District Judge Jay C. Zainey set sentencing for November 26, 2016.

SOURCE: U.S.A.O., Eastern District of Louisiana

Related: Download Brader Yelverton – Factual Basis.pdf


Related:

  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception? (1)
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • France Travail: At least 340,000 job seekers victims of new hack
Category: HackU.S.

Post navigation

← Bitcoin Exchange BTC-E and BitcoinTalk Forum Breaches
Southwest Portland Dental notifies patients of Patterson Dental breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.