Security

Cyber-crime

Man accused of hilariously bad opsec as alleged cybercrime spree detailed

Complaint claims he trespassed, gave himself discounts, and sorted CCTV access…


A Kansas City man who stands accused of having a disregard for basic opsec made his first court appearance on Friday over a series of alleged cybercrimes.

Nicholas Michael Kloster, 31, is alleged to have embarked on a confusing three-month Missouri crime spree that involved breaking and entering into a gym, causing $5,000 worth of damage to a non-profit, and abusing a credit card belonging to a company shortly after it hired him, according to the indictment [PDF].

The complaint claims Kloster was hired by what it refers to as "Company Victim 1" in March 2024 and that he quickly used the company credit card to make various purchases for himself. Only one of these was detailed in the indictment: a thumb drive that prosecutors say was advertised as one that could help users break into computers.

According to the document, Kloster was fired on April 30 – which would make for a short stint of employment – and allegedly attacked "Victim 2," a health club chain, shortly before that termination.

On April 26, or so the complaint claims, Kloster allegedly broke into one of the chain's health clubs shortly before midnight and the following day began telling the owner via email exactly what he had done.

Note, dear reader, that prosecutors allege Kloster used his Victim 1 company email account to do this.

The email detailed in the indictment read: "I managed to circumvent the login for the security cameras by using their visible IP addresses… I also gained access to the Google Fiber Router settings, which allowed me to use [redacted] to explore user accounts associated with the domain… If I can reach the files on a user's computer, it indicates potential for deeper system access."

Kloster allegedly went on to forward a copy of his resume, which the indictment said "greatly differed" from the one he used to secure employment at Victim 1. He claimed to have assisted more than 30 SMBs in the region, seemingly peddling his so-called security services in some sort of guerrilla pitch for a new job.

Prosecutors say health club staff noticed that Kloster's gym membership cost had allegedly been reduced to $1 following the intrusion, that he had allegedly stolen a staff member's name tag, and his account photograph had been erased.

To round things off, Kloster is then alleged to have posted an image to social media of what appeared to be a stream of the gym's CCTV cameras weeks later, captioning it: "How to get a company to use your security service."

Then, less than a month later, on May 20, or so the indictment claims, he entered a non-public restricted area of the nonprofit ("Victim 3") and used a boot disk on a computer, allowing him to access it using multiple user accounts, all while circumventing password protections, according to the indictment.

Kloster then allegedly changed the passwords of multiple users and installed what prosecutors said was a virtual private network on the machine. The non-profit told authorities it spent around $5,000 to undo Kloster's actions.

Kloster faces a two-count charge, one for accessing and obtaining information from "Victim 2's" protected computer, and another for accessing and causing reckless damage to "Victim 3's" protected computer.

The scheduling conference for Kloster's trial is set for April 1, 2025. Kloster's representation was not immediately available for comment ®

Send us news
24 Comments

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Crypto klepto North Korea stole $659M over just 5 heists last year

US, Japan, South Korea vow to intensify counter efforts

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Snyk appears to deploy 'malicious' packages targeting Cursor for unknown reason

Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test