Pirate Sports Streamer Arrested, Turns to MLB Extortion

Bulletin

Join thousands of people getting the latest cybersecurity news every day.

The administrator of your non-public knowledge shall be Threatpost, Inc. , 500 Unicorn Park, Woburn, MA 01801. Detailed data on the processing of non-public knowledge can be found in the privacy policy. message confirming the subscription to the newsletter.

The administrator of your non-public knowledge shall be Threatpost, Inc. , 500 Unicorn Park, Woburn, MA 01801. Detailed data on the processing of non-public knowledge can be found in the privacy policy. message confirming the subscription to the newsletter.

Share this article:

An alleged sports content hacker is accused only of hijacking the league’s feeds, but also threatening to tell reporters how he accessed their systems.

Demanding payment in exchange for publicly disclosing a vulnerability is the same as a bug bounty program; it’s extortion.

A 30-year-old alleged sports content hacker in Minneapolis, Minnesota, has faced a criminal complaint alleging that he not only stole user account credentials and sold access to pirated sports content. , he also asked Major League Baseball for $150,000 in exchange for not telling reporters how he accessed their systems.

The defendant, known in a recently revealed lawsuit (PDF) as Joshua Streit, allegedly contradicted a site called HeHeStreams that sold subscribers to hacked user accounts for Major League Baseball (MLB), the National Basketball Association (NBA), the National Football League. (NFL) and the National Hockey League (NHL) for about $129 according to the year, which reduces costs from valid sources.

According to prosecutors, MLB lost at least $2,995,272 due to the alleged theft of Streit’s games.

FBI agent Joshua Williams said in the complaint that the hacker operated from about 2017 to July 2021, facing two counts of computer intrusion, one count of cable fraud and one count of illicit virtual streaming.

Williams was able to download a subscription to the illicit site, a chat gift card with a user with the nickname “inflix. “Williams was able to hint at the site to Streit through its servers, social media, GitHub, Cloudfare’s payment processor and more. he said.

The offender’s report provides a detailed technical description of the engagement.

“. . . I, the illegal streaming online page, operated through Joshua Streit a/k/a/, ‘Josh Brody’, the defendant, accessed and compromised the user accounts to access the access tokens and identify the applicable decryption keys,” Williams explained in “Streit was then able to move those access tokens and decryption keys directly to the third-party service, which allowed subscribers of the illicit online streaming page to watch the games in broadcast. “

In June 2021, Streit began having difficulty accessing the MLB platform and asked for help, according to the complaint.

“I spent the total month of May, 16 hours a day, looking to find solid, scalable answers [sic],” Streit said on Reddit. “If you have experience with [content delivery networks, or CDNs], scraped or incomplete [s** t], I would like to contact you. Please tap on me on any channel.

An obligated undercover agent.

In a verbal discord exchange with the undercover FBI agent, the complaint alleges that Streit said he would like to “continue to fly my ” NBA league pass ” as I have done for the past five years. “

In August, HeheStream’s administrator account on Reddit posted a timid goodbye, saying the site “ceased all operations” because “my freedom is in jeopardy. “

Federal felons law and sentencing expert James Felman told Threatpost that the timeline for publication matches the indictment document, which states that operations ceased in July 2021, but some other crime led to the offender complaint filed Oct. 25 to seek an arrest warrant opposed to Streit. .

The FBI alleged that Streit had not finished seeking to profit from his illegality in the MLB system. Just before the MLB playoffs on Sept. 28, Streit emailed an MLB official and asked for $150,000 to prevent him from revealing the league’s vulnerability to him. network to the media.

«. . . I believe that although Joshua Streit, also known as “Josh Brody,” the defendant, approached MLB, his simultaneous intrusion into MLB accounts and illegal dissemination of MLB content on the illegal online streaming page indicated that Streit acted knowingly and with the intent to extort money from MLB.

While criminal sentences are possible, Felman was quick to point out to Threatpost that federal sentencing rules give judges a lot of freedom for all sorts of variables. crimes described in the complaint.

“It is moderate to assume that it will end before sentencing is handed down at a sentencing hearing,” Felman added. “It turns out that it has caught their attention. “

Check out our upcoming online, live and on-demand, exclusive and dynamic town halls with cybersecurity experts and the Threatpost community.

Share this article:

RLO’s old trick of exploiting Unicode handles the order of scripts and a related homoglyph attack can imperceptibly replace the malware’s genuine name.

Aamir Lakhani, a security researcher at Fortinet, says no sector is banned on those days: it’s time for everyone to enter the chain of destruction.

German investigators have met a Russian billionaire with large expenses and high expenses who they suspect is a key member of the REvil ransomware gang.

Join thousands of people getting the latest cybersecurity news every day.

An attack on the fuel distribution chain in #Irán has forced the closure of one of the gas stations, leaving a word for it . . . https://t. co/pWDaUaFUQ2

5 days ago

Get the latest breaking news in your inbox every day.

Infosec Insider content is written through a trusted network of Threatpost cybersecurity experts. Each contribution aims to provide a unique voice on cybersecurity issues. The content strives to be of the highest quality, objective and non-commercial.

Sponsored content is paid for through an advertiser. Sponsored content is written and edited through members of our sponsor community. This content creates an opportunity for a sponsor to provide data and feedback directly to the Threatpost audience. Threatpost’s editorial team doesn’t care about writing or editing sponsored content.

Leave a Comment

Your email address will not be published. Required fields are marked *