
A person from Canasus City blamed several organizations for advertising his cyber security services, the US Department of Justice on Wednesday announced.
The 32-year-old Nicholas Michael Closter was inspired to hack in a network of three organizations in 2024 last year, including a health club and a Missouri non-profit corporation.
As Court documentCloster accessed the system of a health club that operates several gyms in Missouri after dissolving a restricted area. Subsequently, he sent an email to an email to one of the owners of the gym chain, claiming that he had hacked his network and offered his services in the same message demanding the company to secure the cyber security consultation contract with the company.
“I managed to ignore the login for safety cameras using my visual IP address. I also got access to Googlefiber router settings, which allowed me to use (redacated) to detect (Redacated) to detect user accounts associated with domains,” Closter said in emails. “If I can reach files on the user’s computer, this intensive system indicates potential for access.”
He also said in that email that he had helped more than 30 small to medium sized industrial businesses in the Canasus City, Missouri region “.
In addition to presenting a contract motion to the gym owner, the closter removed his photo from the gym database, reduced his monthly gym membership fee, only $ 1, and stole a staff member’s name tag.
Week later, the defendant posted a screenshot on social media that displayed the gym’s security camera system and indicated that he had gained control over it.
On 20 May, Closter allegedly violated the restricted complex of a non -profit organization, where he used a boot disc to bypass certification requirements and stole sensitive information from a “protected computer,” a system “, used or influenced by interstate or foreign commerce or communication” as described by DOJ.
Closter used its access to a non -profit computer to establish virtual private networks (VPN) and replace passwords of several user accounts.
The defendant is also accused of using a stolen credit card information from a third company, a former employer who fired the closter on April 30, 2024, as it used the stolen company’s credit card, designed to exploit weak systems.
Closter is facing Possible punishment up to five years In federal prison without parole, a fine of up to $ 250,000, release under three years of surveillance, and an order of restoration.


