Virtual private network provider PureVPN helped the FBI track down an Internet stalker, by combing its logs to reveal his IP address.
The Department of Justice announced on Friday the arrest of Ryan Lin, a 24-year-old from Newtown, Massachusetts, on charges that he cyber-stalked a former room-mate.
According to the complaint [PDF] against Lin in the Massachusetts District Court, his alleged campaign against Jennifer Smith included doxxing (including posting passwords to her online accounts), posting intimate photos with the suggestion they were of Smith (though without her face), rifling her personal journal and emailing private information to her contacts, posting fake profiles of her to sites “dedicated to prostitution, sexual fetishes, and other sexual encounters”, bomb threats, tricking a friend of Smith’s into calling the police to her house, death and rape threats, and sending “images that likely constitute child pornography” to her family and friends.
The Feds allege Lin used various privacy services: logging in via Tor, to conceal his IP address; VPN services; anonymised international texting services; and offshore private email providers.
However, the complaint revealed, he made a fundamental error by using a work computer for some of his campaign, and even though he’d been terminated and the OS reinstalled on the machine, there were footprints left behind for investigators to associate Lin with the 16-month campaign against Smith.
Key details turned up by investigators included:
Lin’s most-visited Website was the TextNow anonymous texting service;
为了避免网络特征分析,新型的僵尸网络已经不再有中央控制服务器,而采用点对点的技术,这样就很难被抓获或打跨,真是道高一尺,魔高一丈啊。
Lin had a Proton Mail account;
There were “artefacts” indicating he used PureVPN; and
Similar artefacts suggesting he’d accessed his Gmail account from the machine.
“Further, records from PureVPN show that the same email accounts – Lin’s Gmail account and the teleprtfx Gmail account – were accessed from the same WANSecurity IP address,” the document stated.
网络安全法在线讲解-《网络安全法》的突出亮点 https://v.qq.com/x/page/u0514qmyllg.html

And that’s where the surprise came in – at least for those who believed a VPN is a complete protection: “Significantly, PureVPN was able to determine that their service was accessed by the same customer from two originating IP addresses,” claim the Feds (allegedly, those IP addresses were at Lin’s work and home addresses).
The investigators claim that tweets from Lin showed he was aware there was some risk of logging from VPN providers. As recently as June, he posted a tweet critical of provider IPVanish about its logging claims:
“There is no such thing as a VPN that doesn’t keep logs. If they can limit your connections or track bandwidth usage, they keep logs.”
If found guilty, Lin faces up to five years in prison and up to three years of supervised release.
Pure VPN’s privacy policy states: “We will only share information with authorities having valid subpoenas, warrants [and] other legal documents…provided we have the record of any such activity.
®
Sponsored:
The Joy and Pain of Buying IT – Have Your Say
支付卡行业小商户成黑客攻击目标,三四线的商户包括一些餐馆现在开始成为互联网罪犯窃取支付卡数据的目标。

猜您喜欢

福利| 所有讲AI安全的讲座里,这可能是最实用的一场
网络安全意识——安全与互联网接入分享便利性之间的平衡
网络安全法普法宣传 004《网络安全法》的突出亮点
黄鹤楼和户部巷 周末两天游武汉(上)
RANKBOOST WIDESKTOPS
如何推销信息安全思想观念