DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

California man convicted of hacking Embarcadero Media in 2015

Posted on June 7, 2018 by Dissent

SAN JOSE – A federal jury returned a verdict yesterday against Ross Colby, finding him guilty of three counts of computer intrusion, one count of attempting to damage a protected computer, and one count of intentionally damaging a protected computer, announced Acting United States Attorney Alex G. Tse and Federal Bureau of Investigation (FBI) Special Agent in Charge John F. Bennett.  The verdict was delivered by the jury after a six-day trial before the Honorable Lucy H. Koh, U.S District Judge.

According to court documents and evidence presented during the trial Colby, 35, of Richmond, Calif., illegally accessed the web accounts of San Francisco Bay Area print and online newspaper publisher Embarcadero Media.  Embarcadero Media is the Palo Alto-based parent company of numerous Bay Area newspaper publications, including Palo Alto Weekly, Mountain View Voice, Pleasanton Weekly, and The Almanac in Menlo Park.  In September of 2015, the FBI was asked to investigate the computer intrusion after Embarcadero’s news websites were replaced with a picture of Guy Fawkes, the image associated with “Anonymous,” a hacking collective.  Investigators found that in July of 2015, Colby accessed Embarcadero’s corporate email and obtained the contents of an account belonging to an Embarcadero employee.  Then, in September of 2015, Colby used the information from the email account to disrupt Embarcadero’s operations.  Among the actions that Colby carried out were to cancel Embarcadero’s domain names and change the publisher’s mail exchange records to redirect its corporate email.  At trial, a witness testified that this conduct caused approximately $32,000 in damages and remediation costs to Embarcadero Media.

On April 6, 2017, a federal grand jury in San Jose indicted Colby and charged him with three counts of misdemeanor computer intrusion, in violation of 18 U.S.C. § 1030(a)(2)(C); one count of felony attempt to damage a protected computer, in violation of 18 U.S.C. §§ 1030(a)(5)(A) and (c)(4)(B)(ii); and one count of felony intentional damage to a protected computer, in violation of §§ 1030(a)(5)(A) and (c)(4)(B)(i).  Pursuant to yesterday’s verdict, Colby was found guilty of all the charges.

Colby is free on bail, pending sentencing.  Judge Koh scheduled Colby’s sentencing for September 19, 2018.  Colby faces a statutory maximum sentence of up to 10 years in prison and a $250,000 fine for each of the felony counts and up to a year in prison and a $100,000 fine for each of the misdemeanor charges.  In addition to the prison terms and fines, the court also may order Colby to serve an additional period of supervised release, pay restitution, and pay other monetary penalties.  However, any sentence will be imposed by the court only after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

Assistant United States Attorneys Susan Knight and Joseph Springsteen are prosecuting the case with the assistance of Lakisha Holliman and Elise Etter.  The prosecution is the result of an investigation by the FBI.

SOURCE:  U.S. Attorney’s Office, Northern District of California

Further Information:
Case #: 17-cr-00168 LHK

Some background information on the case can also be found in this earlier news article in the Mountain View Voice, one of the papers published by Embarcadero Media.

Category: Business SectorHackU.S.

Post navigation

← Blue Cross Blue Shield of Illinois notifies members after vendor alerts them to a fraudulent provider
Claims San Diego pharmacy waited months to notify all patients about serious security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.