Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Man Admits Hacking Disney and Leaking Data Disguised as Hacktivist 

A 25-year-old has admitted hacking Disney systems and leaking data under the guise of a hacktivist collective named NullBulge.

Disney hack

A 25-year-old man from California has pleaded guilty to hacking Disney systems and leaking data under the guise of a hacktivist collective, the Justice Department announced.

According to the DoJ, Ryan Mitchell Kramer has pleaded guilty to accessing a computer and obtaining information, and threatening to damage a protected computer, as well as to two felony charges that each carry a prison sentence of up to five years.

Kramer is behind the 2024 hack targeting The Walt Disney Company. The media giant launched an investigation into the incident in July 2024, after a threat actor calling itself NullBulge announced the theft of 1.1 Tb of data from Disney’s internal Slack channels, including messages, information on unreleased projects, login credentials, and source code. 

NullBulge claimed to be a “hacktivist group protecting artists’ rights and ensuring fair compensation for their work”. 

Security firm SentinelOne detailed NullBulge’s activities, pointing out that their actions contradicted their hacktivism claims. SentinelOne analyzed how the threat actor targeted AI- and gaming-related entities with ransomware and other malware through malicious code planted on platforms such as GitHub and Hugging Face. 

The malicious code distributed by Kramer was disguised as a tool for creating AI-generated art. In reality, it would deploy malware that enabled the hacker to gain access to the victim’s device.

Advertisement. Scroll to continue reading.

In the case of Disney, an employee downloaded the fake AI tool on his personal computer. The credentials stored on the compromised device enabled Kramer to gain access to the Slack account used by the employee as part of his job at Disney. This enabled the hacker to steal vast amounts of information from thousands of Slack channels operated by Disney.

The DoJ said the hacker — while claiming to represent the NullBulge hacktivist group, allegedly based in Russia — attempted to extort the Disney employee. When the employee failed to respond, Kramer leaked his personal information along with the stolen Disney files. 

Disney reportedly decided to stop using Slack for in-house communication following the data leak. 

The employee who downloaded the malware and enabled Kramer to gain access to Disney data was terminated for misconduct following the incident. The man filed a wrongful termination complaint against the media giant. 

Authorities said Kramer admitted to hacking into the computers and accounts of at least two other victims, but they have not been identified. 

In an unrelated Disney hacking story, a former Walt Disney World worker was sentenced last month to three years in prison for breaking into the company’s servers to cause disruptions and manipulate menus.

Related: Suspected Scattered Spider Hacker Pleads Guilty

Related: Two Venezuelans Arrested in US for ATM Jackpotting

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.