Jessie Kipf, a notorious hacker, tried to fake his death to avoid paying $116,000 in child support to his ex-wife. But, the FBI and Mandiant, a cybersecurity firm, were hot on his trail, let’s discuss.
Jessie Kipf accessed the Hawaii Death Registry System using a stolen doctor’s login and created a fake death certificate for himself. He even used the doctor’s digital signature to make it look legit.
The FBI and Mandiant started investigating Kipf after discovering his hacking activities. They discovered he was selling access to systems he hacked and had ties to a notorious cybercrime gang.
Kipf’s main motive was to avoid paying child support. He owed his ex-wife around $116,000 to support their daughter.
Jessie Kipf is known as “FreeRadica”l and “GhostMarket09,” a notorious American hacker and cybercriminal. He has reportedly accessed and sold sensitive information from various organizations, including healthcare and financial institutions.
Kipf’s hacking activities began around 2014 and involved various cybercrime schemes, including: “university of Hawaii database breach, Selling Sensitive Information (SSNs, financial data), creating and distributing malware (RATs, keyloggers), social engineering and phishing attacks, accessing and exploiting vulnerabilities in software and systems, etc.“
Hacked into systems using social engineering tactics, phishing, and exploited vulnerabilities. Created and sold malware, including remote access trojans (RATs). Kipf made the news because he hacked into the Hawaii Death Registry System using a stolen doctor’s login and created a fake death certificate for himself to avoid paying child support.
However, law enforcement agencies, including the FBI, have indeed intensified their efforts to combat cybercrime and bring perpetrators to justice. This is a significant development, considering the alarming rise in cybercrime cases, with costs escalating from $3 trillion in 2015 to over $6 trillion in 2021.
According to Techbooky’s archived recommendable cybersecurity insights to tackle this growing concern, in line with various law enforcement agencies employable protocols. For instance, the FBI’s Internet Crime Complaint Center (IC3) plays a vital role in tracking and analyzing trends, identifying patterns, and developing strategies to combat emerging threats.
Without further ado, the FBI apprehended Jesse Kipf through a combination of investigative techniques and collaborative efforts: The FBI received information about Kipf’s hacking activities from an unidentified source.
The FBI’s Cybercrime Unit launched an investigation, monitoring Kipf’s online activities. FBI agents posed as buyers of stolen data, engaging with Kipf online without his consent that he’s been communicating with an undercover internet user.
Aside from stalking Kipf online via an FBI agent posing as a potential customer of his mischievous business, the FBI traced Kipf’s IP address to his location.
The federal agents analyzed Jessie Kipf’s devices, finding evidence of hacking tools and stolen data investigators assigned to solve the perpetrator’s case obtained Kipf’s email and communication records to yield a productive investigation.
The FBI worked with Hawaiian authorities to verify Kipf’s fake death certificate serving as a stepping stone for the federal agency to collaborate with its local university to investigate Kipf’s alleged hacking activities.
Finally, the FBI also partnered with other cybersecurity companies to track Jessie Kipf activities which led federal agents to proceed with the agency protocol that affirms the perpetrator’s arrest and prosecution by executing a search warrant at Kipf’s residence.
Discover more from TechBooky
Subscribe to get the latest posts sent to your email.