Skip to main content

21 YEAR OLD HACKER GETS 30 MONTHS JAIL TERM. Automatic Publishing Via Osuta Yusuf Robot Trigger. LuminosityLink Hacking Tool Author Gets 30 Months Prison Sentence. A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure. First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently." However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to: Record the keys that victims pressed on their keyboardsSurveil victims using their computers' cameras and microphonesView and download the computers' filesSteal names and passwords used to access websitesIn his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators. However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent. Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own luminosity.link website and public internet forum HackForums.net. According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide. "Our modern society is dependent on computers, mobile devices, and the use of the internet," said Robert M. Duncan, Jr., United States Attorney for the Eastern District of Kentucky. "People simply have to have confidence in their ability to use these modern instruments to transact their business, privately communicate, and securely maintain their information." "It is essential that we vigorously prosecute those who erode that confidence and illicitly gain access to computer systems and the electronic information of others. Everyone benefits when this deceitful conduct is discovered, investigated, and prosecuted." According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years. Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.

Automatic Publishing Via Osuta Yusuf Robot Trigger.


LuminosityLink Hacking Tool Author Gets 30 Months Prison Sentence.


A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison.


According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure.


First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently."


However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to:

Record the keys that victims pressed on their keyboardsSurveil victims using their computers' cameras and microphonesView and download the computers' filesSteal names and passwords used to access websitesIn his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators.


However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent.


Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own luminosity.link website and public internet forum HackForums.net.


According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide.


"Our modern society is dependent on computers, mobile devices, and the use of the internet," said Robert M. Duncan, Jr., United States Attorney for the Eastern District of Kentucky. "People simply have to have confidence in their ability to use these modern instruments to transact their business, privately communicate, and securely maintain their information."






"It is essential that we vigorously prosecute those who erode that confidence and illicitly gain access to computer systems and the electronic information of others. Everyone benefits when this deceitful conduct is discovered, investigated, and prosecuted."





According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years.


Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.


Comments

Popular posts from this blog

Escaped Murder Suspect Finally Arrested in Yumbe Regional Referral Hospital, Yumbe District.

Story by Osuta Yusuf. 19-November-2024. 📸: Eyotre Kennedy handcuffed on bed while receiving medication this morning at Yumbe Regional Referral Hospital in Yumbe District. Eyotre Kennedy originating from Etoko village, Nyoroo Parish, Nyadri Sub-county in Maracha District who has for many years been terrorizing residents in his village, has finally been arrested this Monday morning 19-November-2024 while receiving treatment at Yumbe Regional Referral Hospital in Yumbe District following injuries he sustained from Theft mission on Saturday night 16-November-2024 in Owapi village, Azapi parish in Odupi Sub-county, Terego East Constituency in Terego District. Click here on the link  https://informationispowah.blogspot.com/2024/11/fugitive-who-chopped-3-people-killed.html   to read the story on his Theft of Goats in Terego. Upon getting cut on the finger and leg by the Mob as he attempted to fight and overpower owner of the goats he attempted to steal on Saturday night ...

41-Years-Old Man Digs His Own Grave in Maracha District.

Story by Osuta Yusuf.  Maracha District.  📸: The grave been dug by Mr Opiga Michael, a victim of frustration. Photo taken by Osuta Yusuf , on Wednesday 11-September-2024. The residents of Ebapi village, Baria Parish in Nyadri Sub-county, Maracha east constituency, Maracha District are in shock after a 41 year old man started digging his own grave. The man, identified as Mr Opiga Michael, who seems to be frustrated over some challenges in life, started digging his own grave on Tuesday 10-September-2024 until he was stopped by the elders in Nyaria clan. 📸: Opiga Michael, the Victim of Frustration. Photo by Osuta Yusuf , Information is Power. While speaking to our reporter on Wednesday evening 11-September-2024, Mr Opiga Michael, said, his main plan  was to commit suicide after finishing digging the grave for burying himself, explained that, he feels frustrated, abandoned and hated by his own clan people, whom he accused of piling lies against him a...

Wedded Ayivu West MP Lematia John Fights Over Another Woman.

  📸: Hon Lematia John. By URN. Police in Arua district are investigating a case of assault and threatening violence involving the Member of Parliament for Ayivu West Constituency John Lematia and James Ariko, a DSTV technician in Arua city. Drama ensued on Easter Sunday 31-3-2024 at Dream Land Hotel located at Kuluva trading center along Arua-Nebbi highway in Arua district when the legislator and the technician engaged in a fight reportedly over a woman identified as Faith Eyotaru 25, a relationship officer at Victoria University Kampala. The scuffle started after Ayivu West Mp John Lematia went to swim at Dreamland Hotel with Faith Eyotaru only to find Ariko, who had gone to the same hotel earlier. However, upon seeing the duo coming out of the vehicle, Ariko confronted Lematia with both men claiming to be having a relationship with the lady. It took the intervention of the staff at the hotel who intervened and separated the fight between the men. Josephine Angucia, the West Nil...