DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Jail for man who hacked 1000 student email accounts in search for sexually explicit images

Posted on January 26, 2018 by Dissent

There’s a follow-up to a case I previously noted on this site in November, 2016. Graham Cluley reports:

A 30-year-old man has sentenced to six months in prison, after he was found guilty of accessing more than 1,000 email accounts at a New York City-area university in a hunt for sexually explicit photographs and videos of college-aged women.

Jonathan Powell, of Phoenix, Arizona, breached the unnamed university’s servers to gain access to a email password reset utility used by IT staff when students forgot their login credentials. Once Powell had gain accessed to compromised email accounts he was able to request password resets on third-party sites, allowing him to log into victims’ various other online accounts including Apple iCloud, Facebook, Google, LinkedIn, and Yahoo.

Read more on WeLiveSecurity.

Related: Press Release from U.S. Attorney’s Office, Southern District of New York:

Geoffrey S. Berman, the United States Attorney for the Southern District of New York, announced that JONATHAN POWELL was sentenced yesterday to six months in prison for computer fraud in connection with his scheme to obtain unauthorized access to more than 1,000 email accounts maintained by a New York City-area university in order to download sexually explicit photos and videos. POWELL previously pled guilty to the charge on August 9, 2017, in Manhattan federal court before United States District Judge Alison J. Nathan, who also imposed POWELL’s sentence.

U.S. Attorney Geoffrey S. Berman said: “Jonathan Powell used his computer skills to breach the security of a university to gain access to their students’ personal accounts. Once Powell had access, he searched the accounts for compromising photos and videos. No college student should have to fear that personal, private information could be mined by strangers for potentially compromising material.”

According to the allegations in the Information to which POWELL pled guilty, a criminal complaint filed against POWELL and other filings made in the case, and statements made during the plea and other proceedings in the case:

From October 2015 up to September 2016, POWELL obtained unauthorized access to email accounts hosted by a U.S.-based university, which has its primary campus in New York, New York (“University-1”). POWELL obtained unauthorized access to these accounts by accessing the password reset utility maintained by the email servers at Univeristy-1, which was designed to allow authorized users to reset forgotten passwords to accounts. POWELL utilized the password reset utility to change the email account passwords of students and others affiliated with University-1. Once POWELL gained access to the compromised email accounts (the “Compromised Accounts”), he obtained unauthorized access to other password-protected email, social media, and online accounts to which the Compromised Accounts were registered, including, but not limited to, Apple iCloud, Facebook, Google, LinkedIn, and Yahoo! accounts.

Specifically, using the Compromised Accounts, POWELL requested password resets for linked accounts hosted by those websites (the “Linked Accounts”), resulting in password reset emails being sent to the Compromised Accounts, which allowed POWELL to change the passwords for the Linked Accounts. POWELL then logged into the Linked Accounts and searched within the Linked Accounts, gaining access to private and confidential content stored in the Linked Accounts. In one instance, POWELL searched a University-1 student’s linked Gmail account for digital photographs and for various lewd terms. The Government’s investigation ultimately revealed that POWELL accessed the Compromised and Linked Accounts in order to download sexually explicit photographs and videos of college-aged women.

An analysis of University-1 password reset utility logs and other data revealed that POWELL accessed the University-1 password reset utility approximately 18,640 different times between October 2015 and September 2016. During that time, POWELL attempted approximately 18,600 password changes in connection with approximately 2,054 unique University-1 email accounts, and succeeded in making approximately 1,378 password changes in connection with approximately 1,035 unique University-1 email accounts, in some cases compromising the same email account multiple times.

Additional investigation revealed that POWELL had also compromised 15 email accounts hosted by a second university located in Pennsylvania. In a post-arrest statement made to investigating agents, POWELL additionally admitted to compromising email accounts at several other educational institutions located in Arizona, Florida, Ohio, and Texas.

* * *

In addition to the prison term, POWELL, 30, Phoenix, Arizona, was sentenced to two years of supervised release and ordered to pay $278,855 in restitution.

Mr. Berman praised the investigative work of the Federal Bureau of Investigation.

The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit. Assistant United States Attorney Christopher J. DiMase is in charge of the prosecution.


Related:

  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Oracle silently fixes zero-day exploit leaked by ShinyHunters
  • Capita hit with £14m fine for personal data breach in 2023 cyber attack
  • In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. (1)1)
Category: Education SectorHack

Post navigation

← Former employee of Veterans Affairs indicted for attempted sale of personal info of veterans and employees
UK: Former civil servant suing government department after ‘highly sensitive’ medical information reportedly revealed in email →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.