Back to home
Technology

UC Berkeley Ph.D. candidate busted repeatedly sabotaging rival student's computer, causing $46,000 in damages — hidden camera sting catches perp causing "sparks to fly out of the laptop," student arrested on three felony counts

Source

Tom's Hardware

Published

TL;DR

AI Generated

A UC Berkeley Ph.D. candidate was caught sabotaging a rival student's computer, causing $46,000 in damages. A hidden camera sting set up by a professor captured the perpetrator causing sparks to fly out of the laptop. The suspect, identified as Jiarui Zou, was arrested on three felony counts related to the destruction of computers. Zou's actions led to significant damage, with the professor suspecting a pattern of similar behavior over the years. The case is set for trial, with the first court session scheduled for December 15.

Read Full Article

Similar Articles

Decades-old pre-Stuxnet cyber sabotage tool breaks cover, NSA listed it as 'nothing to see here' — fast16 targeted nuclear reactors, dam design, and other high-precision civil engineering software years before Stuxnet broke cover

Decades-old pre-Stuxnet cyber sabotage tool breaks cover, NSA listed it as 'nothing to see here' — fast16 targeted nuclear reactors, dam design, and other high-precision civil engineering software years before Stuxnet broke cover

Security researchers have revealed a cyber-sabotage tool called fast16 that predates Stuxnet by at least five years. This state-level tool targets high-precision calculation software, introducing subtle inaccuracies in key calculations used in projects involving nuclear reactors, dam design, and physics simulations. The tool was identified based on an architectural hunch and was delivered through a carrier worm that targeted Windows 2000 and XP environments. Fast16 corrupts floating-point calculations in a predictable way, potentially leading to unexpected engineering project outcomes. The discovery of fast16 sheds light on the existence of state-grade cyber sabotage dating back to the mid-2000s.

Tom's Hardware
Mobile SMS blasters in vehicles prowled Canadian streets, causing 13 million network disruptions and infiltrating tens of thousands of devices — blaster blocked 911 calls, stole cellphone data

Mobile SMS blasters in vehicles prowled Canadian streets, causing 13 million network disruptions and infiltrating tens of thousands of devices — blaster blocked 911 calls, stole cellphone data

Toronto police arrested three individuals running a mobile SMS blaster scheme in downtown Toronto, which caused 13 million network disruptions and infiltrated tens of thousands of devices. The SMS blasters blocked 911 calls and stole cellphone data by impersonating cell towers and sending fraudulent texts. The operation was the first of its kind in Canada and has since been dismantled, but authorities warn of continued vigilance against fraudulent texts. The devices used in the scheme were uniquely built and not publicly shared for safety reasons, and similar operations have been reported in other countries like the Philippines.

Tom's Hardware
Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay

Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay

Former ransomware negotiator Angelo Martino has pleaded guilty to collaborating with the ALPHV/BlackCat ransomware gang to extort five U.S. companies, providing confidential details about the victims' insurance policies and negotiation perceptions. Martino's actions led to over $75 million in ransom payments, with individual payments exceeding $25 million. He also participated in deploying BlackCat ransomware against additional U.S. victims, demanding over $16 million in ransom. Law enforcement has seized more than $10 million from Martino, including cryptocurrency and various assets purchased with illicit proceeds. Martino, along with his co-conspirators, faces a maximum of 20 years in prison, with sentencing scheduled for July 9th.

Tom's Hardware
Two US citizens get combined 16 years in prison for running North Korean laptop farms — fake remote IT work scheme netted DPRK $5 million in around three years

Two US citizens get combined 16 years in prison for running North Korean laptop farms — fake remote IT work scheme netted DPRK $5 million in around three years

Two individuals from New Jersey have been sentenced to a combined 16 years in prison for operating laptop farms that enabled North Korean IT workers to pose as Americans and work for U.S. companies, generating around $5 million for North Korea over three years. Kejia Wang and Zhenxing Wang were found guilty of wire fraud and money laundering, with Kejia serving as the U.S.-based manager of the operation. The scheme involved stealing the identities of over 80 U.S. individuals to secure positions in over 100 U.S. companies, resulting in significant financial losses for the affected businesses. The Justice Department has been cracking down on similar operations, uncovering 29 laptop farms across 16 states in mid-2025 and convicting five other individuals involved in such schemes.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.