DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GhostShell, On the Record – Difficulty Finding Work and Risk of Arrest

Posted on March 15, 2016 by Dissent

This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.”

How did GhostShell avoid arrest for so many years? Was his OpSec that good, or is Romanian law enforcement a bit uninterested? We asked him how it is that he was never identified or arrested.  On one occasion, he responded:

I can think of a couple of reasons. One of them is why arrest someone that’s useful, that you can use to move things around in the industry simply by riding that person’s actions? For example, you attack a specific country or region then the topic is about “How well protected are we in that sector?”. By using “the bad guy” as the prime example you can change something within that sphere of influence. It gets the ball rolling. It’s a cool trick.

Another aspect to all of this is my nationality, country of origin. Romania alongside the Republic of Moldova are the current poorest nations in Europe. Despite popular belief on how east europeans are criminal masterminds in the cyber arena, it’s not entirely true. The majority of every single cyber actor that gets caught is low level. Most of them are scammers. They do what they do for profit. Spammers are also notorious  I waited for years to get v&, it’s gotten ridiculous. What am I, untouchable? Bullshit.

Look at romanian hacker news for these past five years. The most notorious one was a cracker. Like, no seriously, it was a literal cracker. I’m not one to make fun of hackers but this guy all he did was crack emails. Got caught for breaching a few celebrity emails then resurfaced later and started successfully attacking high profile politicians? I wonder why the whole thing sounds so familiar.

In any case the point was that east european countries most of the time arrest petty thieves, not internationally wanted hacktivists. Like I mentioned previously, were pretty rare, were like unicorns. On their hunting range, hacktivits are more valued assets than your average ebay scammer. They can use us in internationally debated arenas and is a good excuse for them to socialise with other federal organisations, on the principle “hey you have a cool hacktivist, we have a cool hacktivist too”.

Knowing GhostShell’s plan to dox himself in the hopes it would help him find work in the industry, we asked him if he would work for the Romanian government if they tried to recruit him – or, for that matter, whether any other governments had approached him or vice versa:

Screw the romanian government. I don’t wanna work for those douchebags. The romanian authorities can’t wait to sell me to the americans. I just want to get this over with so I can get a job in the industry. I’m thinking of working for the russians. I waited for years to get v&, it’s gotten ridiculous. What am I, untouchable? Bullshit.

Q: Have any governments or agents tried to recruit you to hack for them?

Ironically the only governments that tried to recruit me were the same ones I publicly declared war to. The chinese and the russian one. That very same year in 2012. I never replied back to the chinese which prompted them the next year to send me hacker convention invites on my tormail address which I ignored. Funny stuff though. The russians tried to bullshit me by saying they were from Ukraine or Belarus and that “we could help each other out”, the whole thing was so amusing I just had to reply them back. I straight out called on their lies, said that I knew they were russian and if they didn’t admit to it and get to the point I would stop talking to them. They replied back and confirmed. I never contacted them again.

Q: Did you ever apply to work for any government?

No. I did apply this one time to the CIA on their website though. Does that count? I think it was in 2014, I was so bored, nothing was happening on the networks I was in so I went to the CIA application portal and midway through I noticed it was vulnerable to XSS. So I did what every bored hacker would do, I exploited it, wrote with privileges on their site that “We’ve got some great midget porn. Join us today!”, took a screenshot of it and shared it.

Still somewhat disbelieving that he intended to dox himself, at one point we asked GhostShell, So… your intentions are to out yourself/dox yourself through our reporting/articles and then hopefully get a real job in the industry, right? Are you hoping you can dox yourself and get work without ever being prosecuted by the Romanian govt or other govts, or are you thinking/resigned that you will get arrested and jailed before you can change your life to get work in the industry, or…?  He answered:

No, I’m all for being prosecuted by any gov. I just want to do it and get this over with. I’m not trying to run or make excuses for myself.

Even though I know from the experience of others that hackers generally tend to not go to prison especially if they’re first time offenders, with the exception where they may end up in a rehabilitation centre if they have additional issues like drug induced or alcohol problems, there is always a possibility   that my neanderthal people will lock me up because of my activities.

Then again I highly doubt that for one solid reason. There’s a legislation set in place in Romania that says if you’re prosecuted over here you can’t be anywhere else of the same crime. So if they do decide to charge and lock me here, the american government can’t do it anymore. The grounds for an extradition would become void as well.

I personally just want to get past this and work legally in the industry. There are so many more projects that I would like to apply from that side of the field that I wouldn’t be able to realistically put out from here, due to limitations, lack of resources, isolation from the community and so on. No matter how much I managed to do all these years both publicly and behind the scene there are just some things you can’t do by yourself.

Interview Topics:

  • #OpRomania
  • Anonymous
  • MalSec
  • “Team” GhostShell?
  • More on Snitches, the Feds, and the Scene
  • Why did he really disappear in 2013?
  • On criticisms of “simple” hacks
  • Psychological Factors
  • Difficulty Finding Work and Risk of Arrest
  • If You Knew Then What You Know Now….

 


Related:

  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Commentaries and AnalysesHack

Post navigation

← GhostShell, On the Record – Psychological Factors
GhostShell, On the Record – If You Knew Then What You Know Now…. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.