Skip to main content

21 YEAR OLD HACKER GETS 30 MONTHS JAIL TERM. Automatic Publishing Via Osuta Yusuf Robot Trigger. LuminosityLink Hacking Tool Author Gets 30 Months Prison Sentence. A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure. First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently." However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to: Record the keys that victims pressed on their keyboardsSurveil victims using their computers' cameras and microphonesView and download the computers' filesSteal names and passwords used to access websitesIn his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators. However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent. Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own luminosity.link website and public internet forum HackForums.net. According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide. "Our modern society is dependent on computers, mobile devices, and the use of the internet," said Robert M. Duncan, Jr., United States Attorney for the Eastern District of Kentucky. "People simply have to have confidence in their ability to use these modern instruments to transact their business, privately communicate, and securely maintain their information." "It is essential that we vigorously prosecute those who erode that confidence and illicitly gain access to computer systems and the electronic information of others. Everyone benefits when this deceitful conduct is discovered, investigated, and prosecuted." According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years. Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.

Automatic Publishing Via Osuta Yusuf Robot Trigger.

LuminosityLink Hacking Tool Author Gets 30 Months Prison Sentence.

A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison.

According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure.

First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently."

However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to:
Record the keys that victims pressed on their keyboardsSurveil victims using their computers' cameras and microphonesView and download the computers' filesSteal names and passwords used to access websitesIn his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators.

However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent.

Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own luminosity.link website and public internet forum HackForums.net.

According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide.

"Our modern society is dependent on computers, mobile devices, and the use of the internet," said Robert M. Duncan, Jr., United States Attorney for the Eastern District of Kentucky. "People simply have to have confidence in their ability to use these modern instruments to transact their business, privately communicate, and securely maintain their information."


"It is essential that we vigorously prosecute those who erode that confidence and illicitly gain access to computer systems and the electronic information of others. Everyone benefits when this deceitful conduct is discovered, investigated, and prosecuted."


According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years.

Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.

Comments

Popular posts from this blog

UGANDA ELECTORAL COMMISSION TO ELIMINATE NATIONAL IDENTIFICATION CARDS (IDs) FOR 2021 GENERAL ELECTIONS.

The elimination of using National IDs (Ndagamuntu) for the 2021 elections should not have come as a surprise. One would be very NAIVE to think that Bobi Wine has not prepared for this in his Business Plan under the RISK section. It is public knowledge that our EC is not independent.  It is also public knowledge that Military Dictator Yoweri Museveni will never lose an election. What stunned us this morning is when we noticed that on social media, people were mocking Bobi with his "get your Ndagamuntu".  We are on record for saying to all Our readers that the National ID is like Apartheid in South Africa. Students of History would know how those IDs were being used to arrest people, deny them jobs, deny them basic services. Consequently, Bobi was not wrong and will never be wrong on the Ndagamuntu. Except the ones attacking him and mocking him forget that in Uganda, now, no National ID (Ndagamuntu), no service.  If you have not been denied registering your child i...

President Museveni Praises Soldiers for Torturing Bobi Wine in Arua on August 2018.

        President Museveni at the passout of police officers in Masindi Friday https://www.facebook.com/1829407613953796 President Museveni has praised his Special Forces Command [SFC] guards for properly and legally beating National Unity Platform [NUP] presidential flagbearer, Robert Kyagulanyi aka Bobi Wine. “The other day, there was a fracas in West Nile where our young friend Bobi Wine was fighting security people,” Museveni said Friday while passing out police recruits at Kabalye Training School in Masindi district. “I think they beat him a bit and then they came and said a Member of Parliament has been beaten. I said let me study and see how he was beaten. I found the man had been beaten in the right way,” Museveni explained. “This was because…I think this was SFC people who are not police-minded. They are used to doing other things. But somehow they managed to act properly, I was surprised.” When they [SFC] went where this young man was in the room, he had ca...

Here is Why Our Utterances For Praying Jesus And God To Come Liberate Ugandans, May Be Misplaced. This Phrase is like inform of a Letter To Some Categorized Section Of Ugandans.

https://m.facebook.com/yusufosuta/photos/a.1896701010557789/2070383359856219/?type=3 OPEN LETTER TO NRM SUPPORTERS - NATIONAL ROBBERS MOVEMENT. .................................................................................. Last week of March, a friend told me to pray for Uganda.  I told him that he was an Idiot and we have prayed for too long and we are still hungry and sick and Jesus is not coming soon to liberate us. He then ignored the STUPID and sent me a picture we all now know.  It got me totally messed up.  This guy was telling me to pray then sends a picture of men bowing down in blood.  He might have meant guns but I blocked him because his utterances of praying for Uganda were misplaced. I unblocked him 3 weeks later and asked him about praying and assassinations.  His reply "eithrr prayers or guns or both". I hate violence with a passion.  So he is now blocked in like FOREVER. Do you feel safe?  Do not feel safe. Uganda regim...