Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Hacker Behind Nude Celebrity Photos Gets 10 Years

LOS ANGELES – A US judge jailed a computer hacker for 10 years on Monday for breaking into the email accounts of stars, including Scarlett Johansson, naked pictures of whom were leaked online.

A federal judge in Los Angeles also ordered 36-year-old Christopher Chaney, from Florida, to pay a total of $76,000 to Johansson, Christina Aguilera and Renee Olstead, who were among dozens of other people he hacked.

LOS ANGELES – A US judge jailed a computer hacker for 10 years on Monday for breaking into the email accounts of stars, including Scarlett Johansson, naked pictures of whom were leaked online.

A federal judge in Los Angeles also ordered 36-year-old Christopher Chaney, from Florida, to pay a total of $76,000 to Johansson, Christina Aguilera and Renee Olstead, who were among dozens of other people he hacked.

Chaney pleaded guilty in March, in a deal with prosecutors. He could have been jailed for up to 121 years if convicted on all 26 indictments he was originally charged with.

US District Court Judge S. James Otero, said Chaney’s conduct demonstrated a “callous disregard to the victims,” notably for two non-celebrity targets whom he stalked for more than 10 years.

“Illegal wiretapping gave Mr. Chaney access to every email sent to more than four dozen victims, and allowed him to view their most personal information,” said US Attorney Andre Birotte Jr.

“Mr. Chaney is responsible for causing dozens of illegally obtained, private photographs to be posted on the Internet, where they were available for all to see.”

He added: “This case is a sobering reminder that cybercrime poses a very real threat to every American, and everyone should take steps to safeguard their identities and personal information on the Internet.”

His arrest by FBI agents in October last year grew out of an 11-month investigation into the hacking of over 50 entertainment industry names, many of them young female stars like Mila Kunis.

Advertisement. Scroll to continue reading.

The indictments against him included accessing and damaging computers, wire tapping and identify theft.

Hacked pictures of Johansson, star of “The Horse Whisperer” and “Girl with a Pearl Earring,” showed her in a state of undress in a domestic setting.

Aguilera’s computer was hacked in December 2010, when racy photos of her also hit the Internet. Kunis’ cell phone was hacked in September that year with photos of her, including one in a bathtub, spread online.

The FBI alleged that Chaney used open-source, public information to try to guess a celebrity’s email password, and then would breach the account.

He then allegedly communicated directly with contacts found in the hacked email account’s address list and searched the account for photos, information and other data.

To control the account, Chaney is alleged to have altered the email’s account settings to go to a separate, unrelated e-mail address that he controlled.

After gaining complete access to the hacked account, Chaney then used the contact list to “harvest” new targets, according to the FBI.

Bill Lewis of the Federal Bureau of Investigation (FBI)’S LA office, said Monday: “For many victims, Mr. Chaney’s actions were tantamount to breaking and entering of their private homes by a thief in the night.

“Mr. Chaney methodically targeted his victims based on their celebrity without regard for the law or the impact the theft of personal and intimate details would have to their lives.

“This case illustrates the need for cybersecurity vigilance by computer users and, in addition, may serve as a deterrent for anyone contemplating similar intrusions.”

Related: Botmaster Sentenced to 30-month Prison Term

Related: Point-of-Sale Hacker Gets Seven Years In Prison

Related: Hacker Gets 30 Months for Trying to “Hack” His Way Into a Job With Marriott

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...