1 min read

Australian Hacker to Serve 3 Years in Prison for Insider Trading, Unauthorized Computer Access

Luana PASCU

June 25, 2019

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Australian Hacker to Serve 3 Years in Prison for Insider Trading, Unauthorized Computer Access

A 42-year old Australian IT consultant is going to prison for three years on charges of “insider trading, unauthorized access to data with the intention to commit a serious offence (insider trading) and the alteration of electronic devices required by ASIC,” announced ASIC (Australian Securities & Investments Commission) on Tuesday.

As per ASIC, Steven Oakes gained unauthorized access to the private computer system of Melbourne financial publisher Port Phillip Publishing (PPP). By positioning himself within Wi-Fi range, he used hacking software known as Aircrack to intercept network data and steal employee credentials and share tips. Oakes had access to buy recommendations before they were published. He used the stolen information for insider trading on 70 occasions and bought shares in 52 companies.

“The inside information was buy recommendations for shares in particular ASX listed companies from unpublished PPP stock recommendation reports,” ASIC said “The publication of a buy recommendation by PPP for a particular company typically caused an increase in that company”s share price.”

Oakes has been under investigation since 2015 when he ended up getting rid of all the evidence, but in 2016 he started cooperating with ASIC and pleaded guilty to 11 charges. He could be released in 18 months on good behavior.

“Technology-enabled offending, including cyber-related market misconduct, has been a priority for ASIC”s Enforcement teams,” ASIC Commissioner Cathie Armour said. “Despite the sophistication of cyber criminals, ASIC can identify and investigate suspicious market activity connected to computer hacking activities, as it did in the case against Mr Oakes. Traders should be aware that ASIC continues to focus on cyber-related offending.”

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese criminals scam kids desperate to play games for more than three hours a week Chinese criminals scam kids desperate to play games for more than three hours a week
Graham CLULEY

August 12, 2022

2 min read
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read