KPN hack suspect, 17, arrested by Dutch police over server breach

The Dutch High Tech Crime Team has arrested a 17-year-old suspected of compromising customer account data on hundreds of servers belonging to telecommunications operator KPN.

Share

The Dutch High Tech Crime Team has arrested a 17-year-old suspected of compromising customer account data on hundreds of servers belonging to telecommunications operator KPN.

The teenager was arrested last week in the Dutch town of Barendrecht, where police seized an encrypted computer, two laptops and other storage media including external hard drives, DVDs and USB sticks, the Dutch Public Prosecution Service announced earlier this week.

"He has made a confession," said Wim de Bruin, spokesman for the Public Prosecution Service.

The arrested teenager called himself "xS", "Yoshioka" and "Yui" online, and is suspected of breaching the security of hundreds of KPN servers last January, compromising user data and damaging KPN's infrastructure, the Prosecution Service said.

KPN systems overhaul

KPN, the biggest telecom operator in the Netherlands, was forced to overhaul its systems to get rid of installed malicious software after the hack was discovered. The National Cyber Security Centre of the Netherlands also assessed the security breach and concluded that national security was not compromised. In the wake of the hack, KPN suspended access to two million email accounts and asked users to change their passwords, after account details of KPN customers were leaked on Pastebin in early February.

The suspect arrested on March 20 is not associated with the leaking of that data, the prosecution said. As it turned out the account details were looted in an earlier data security breach at web store Baby-Dump.nl by another hacker, as Computerworld UK sister publication Webwereld reported. The KPN data that appeared online was filtered from the captured database.

The arrested teenager was followed online for weeks and the Dutch police collaborated closely with the Cyber Terror Response Centre in South Korea and the Australian Federal Police, according to the Prosecution Service. A person using the aliases "Yui", "Yoshiaka' and "xS", appeared to have bragged about the KPN hack in a chat channel for students at the Korea Advanced Institute of Science and Technology (KAIST), the prosecution said.

Norwegian and Japanese university hacks

Besides hacking KPN the 17-year-old is also suspected of hacking computers at KAIST and at Trondheim University in Norway, and of breaching the security of Tokohu University in Japan. He is also thought to have been running a website used for selling stolen credit card data, according to the prosecution.

According to De Bruin the teenager did not confess to the other allegations. "Those are still being investigated," he said.

The Australian police was involved in the case because the arrested suspect was thought to have ties with a 16-year-old Australian hacking suspect, who was arrested last week.

Possible two-year jail sentence

"The two are connected," De Bruin said, but the nature of that relationship has yet to be discovered, he said. The Australian teen was arrested for Australian cybercrimes and is not a suspect in the KPN hack, said De Bruin; no extradition order is planned.

After the teenager's arrest, a judge ruled that he was to be kept in custody for at least two weeks. After that period, the Prosecution Service will assess if he has to be kept in custody, or can be freed until his trial. The suspect has legal support from a solicitor and was visited by the Dutch council for child protection, said the Prosecution Service. According to De Bruin, the maximum penalty the teenager faces is two years in prison. The maximum penalty is reduced due to his age. "For an adult the maximum penalty would be six years imprisonment," De Bruin said.

In the wake of the hacking, KPN said last week it will appoint a chief security officer, and later this year will set up a permanent control centre to monitor its systems. The company has replaced the compromised systems and will spend months checking the security of all its other systems.

"Recommended For You"

Bredolab botnet suspect raked in €100,000 a month Spamhaus DDoS suspect extradited to the Netherlands