Eighteen-year-old hacker was able to compromise a secure database of a large Telecom operator from his dwelling identify computer. The criminal example of illegal access to legally protected calculator information was opened.
It turned out that a pupil of the Technology College developed a exceptional plan which yous tin sack purpose for downloading other people's accounts. Hacker learned how to create such plan inwards his College.
So, pupil decided to exam this plan on the website of Telecom Operator.
The defendant copied the personal database of 7325 subscribers of the telecommunications company.
And as well as thence the pupil decided to earn roughly money. He had fourth dimension to sell stolen accounts to several customers, xv to eighteen thou rubles per account.
- Christina
It turned out that a pupil of the Technology College developed a exceptional plan which yous tin sack purpose for downloading other people's accounts. Hacker learned how to create such plan inwards his College.
So, pupil decided to exam this plan on the website of Telecom Operator.
The defendant copied the personal database of 7325 subscribers of the telecommunications company.
And as well as thence the pupil decided to earn roughly money. He had fourth dimension to sell stolen accounts to several customers, xv to eighteen thou rubles per account.
- Christina