Skip to main content

Vietnamese hacker breaks into airport system, finds his way to prison

hacker
Image used with permission by copyright holder
Hacking takes all kinds of forms, and sometimes it’s not personal data that’s at risk but rather sensitive commercial or government data that’s the target. That’s particularly true for companies and agencies that run important public services such as transportation, where information like security protocols could be valuable to certain nefarious parties. That’s what makes the theft of sensitive information from Australia’s Perth Airport so scary, and the arrest of the guilty hacker so encouraging.

According to Hot For Security, 31-year-old Le Duc Hoang Hai, a Vietnamese citizen, hacked into the airport’s systems and stole building plans and security information. His method wasn’t particularly technical, rather a byproduct of agencies using third-party contractors. Hai used a contractor’s login credentials to access the information rather than leveraging some complicated network vulnerability, and it’s not clear how he gained access to those credentials.

Recommended Videos

The good news is that Hai did not access any personal information, such as credit card data, and there is no evidence that he was able to sell the data prior to being arrested. In addition, there was no immediate risk to travelers from the hack according to The West Australian. Kevin Brown, the Perth airport’s chief executive, responded to queries, saying, “We completed a full and thorough risk assessment of the data that had been accessed to ensure there had been no threat to the safety of the traveling public. At no time was the safety or security of the airport, its staff, passengers or partners compromised.”

As Hot For Security points out, the use of contractors can be problematic simply because they may not be held to the same strict security standards as employees. Therefore, additional security measures such as two-factor authentication should be implemented to help keep networks protected no matter who is logging in.

This isn’t the first time that Hai has been guilty of illicit hacking. He is suspected of breaking into other organizations in his home country, such as banks, telecommunications companies, and even a military newspaper website. He was sentenced to four years in prison for this particular crime, however.

Mark Coppock
Mark Coppock is a Freelance Writer at Digital Trends covering primarily laptop and other computing technologies. He has…
This Bing flaw let hackers change search results and steal your files
The new Bing preview screen appears on a Surface Laptop Studio.

A security researcher was recently able to change the top results in Microsoft’s Bing search engine and access any user’s private files, potentially putting millions of users at risk -- and all it took was logging into an unsecured web page.

The exploit was discovered by researcher Hillai Ben-Sasson at their team at Wiz, a cloud security firm. According to Ben-Sasson, it would not only allow an attacker to change Bing search results but would also grant them access to millions of users’ private files and data.

Read more
Hackers have found a way to hack you that you’d never expect
A depiction of a hacker breaking into a system via the use of code.

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.

As reported by Bleeping Computer, the BlackByte ransomware group is utilizing a newly discovered method related to the RTCore64.sys driver to circumvent more than 1,000 legitimate drivers.

Read more
Hacking-as-a-service lets hackers steal your data for just $10
A depiction of a hacker breaking into a system via the use of code.

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage and perform their cyber crimes has been discovered -- and it’s gaining traction.

As reported by Bleeping Computer, security researchers unearthed a program called Dark Utilities, effectively providing a command and control (C2) center.

Read more