• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Security

Investigating the Intriguing Story of How the FBI Apprehended Jessie Kipf, the Serial Cybercriminal.

Discussing the psychology of cybercriminals and what triggers their motivation to further actions.

Emeka Eni by Emeka Eni
October 3, 2024
in Security
Share on FacebookShare on Twitter

Jessie Kipf, a notorious hacker, tried to fake his death to avoid paying $116,000 in child support to his ex-wife. But, the FBI and Mandiant, a cybersecurity firm, were hot on his trail, let’s discuss.

Jessie Kipf accessed the Hawaii Death Registry System using a stolen doctor’s login and created a fake death certificate for himself. He even used the doctor’s digital signature to make it look legit.

The FBI and Mandiant started investigating Kipf after discovering his hacking activities. They discovered he was selling access to systems he hacked and had ties to a notorious cybercrime gang.

Kipf’s main motive was to avoid paying child support. He owed his ex-wife around $116,000 to support their daughter.

Jessie Kipf is known as “FreeRadica”l and “GhostMarket09,” a notorious American hacker and cybercriminal. He has reportedly accessed and sold sensitive information from various organizations, including healthcare and financial institutions. 

Kipf’s hacking activities began around 2014 and involved various cybercrime schemes, including: “university of Hawaii database breach, Selling Sensitive Information (SSNs, financial data), creating and distributing malware (RATs, keyloggers), ⁠social engineering and phishing attacks, accessing and exploiting vulnerabilities in software and systems, etc.“

Hacked into systems using social engineering tactics, phishing, and exploited vulnerabilities. Created and sold malware, including remote access trojans (RATs). Kipf made the news because he hacked into the Hawaii Death Registry System using a stolen doctor’s login and created a fake death certificate for himself to avoid paying child support.

However, law enforcement agencies, including the FBI, have indeed intensified their efforts to combat cybercrime and bring perpetrators to justice. This is a significant development, considering the alarming rise in cybercrime cases, with costs escalating from $3 trillion in 2015 to over $6 trillion in 2021. 

 


According to Techbooky’s archived recommendable cybersecurity insights to tackle this growing concern, in line with various law enforcement agencies employable protocols. For instance, the FBI’s Internet Crime Complaint Center (IC3) plays a vital role in tracking and analyzing trends, identifying patterns, and developing strategies to combat emerging threats.

Without further ado, the FBI apprehended Jesse Kipf through a combination of investigative techniques and collaborative efforts: The FBI received information about Kipf’s hacking activities from an unidentified source.

The FBI’s Cybercrime Unit launched an investigation, monitoring Kipf’s online activities. FBI agents posed as buyers of stolen data, engaging with Kipf online without his consent that he’s been communicating with an undercover internet user. 

Aside from stalking Kipf online via an FBI agent posing as a potential customer of his mischievous business, the FBI traced Kipf’s IP address to his location.

The federal agents analyzed Jessie Kipf’s devices, finding evidence of hacking tools and stolen data investigators assigned to solve the perpetrator’s case obtained Kipf’s email and communication records to yield a productive investigation. 

The FBI worked with Hawaiian authorities to verify Kipf’s fake death certificate serving as a stepping stone for the federal agency to collaborate with its local university to investigate Kipf’s alleged hacking activities.

Finally, the FBI also partnered with other cybersecurity companies to track Jessie Kipf activities which led federal agents to proceed with the agency protocol that affirms the perpetrator’s arrest and prosecution by executing a search warrant at Kipf’s residence.

Related Posts:

  • cashapp guy
    Bob Lee Is Dead, The Cash App Founder Was Stabbed To…
  • windows11bsod
    Microsoft's Revamp, The Windows BSOD May Become Black
  • mgm-3-rt-bb-230914_1694697039563_hpMain
    MGM Resorts' Wake-Up Call From Scattered Spider Hackers
  • GettyImages-1231356109
    Google Customer Data Stolen in Salesforce Database Hack
  • Elon Musk Brazil
    How Musk's X Disinformation Row Sheds Light on…
  • Computer-Giant-Dell-Allegedly-Breached-Employee-and-Partners-Data-Leaked
    Dell Confirms Data Breach, Claims only Demo Data Stolen
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybercrimecybercriminalfbiinvestigative
Emeka Eni

Emeka Eni

I am a tech enthusiast, creating contents, graphic designer and am Africa.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • 9Mobile Rebrands as T2 to Regain Market Share in Nigeria August 10, 2025
  • Ghana, MultiChoice Reach Crucial Stage in Pay-TV Dispute August 10, 2025
  • Tanzania’s Digital Payments Hit $11.6B as Real-Time Use Grows August 10, 2025
  • Meta Buys WaveForms, An AI Audio Firm August 9, 2025
  • Microsoft Lens Retired as AI Takes Over August 9, 2025
  • South Africa Investigates Truecaller August 9, 2025

Browse Archives

August 2025
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Jul    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.