Former Disney Employee Charged with Menu Hacking and Threats

/ Disney, hacking, cybercrime, menu alterations, legal issues

Overview of the Incident

Last week, a former Disney employee was arrested for allegedly hacking into the company's systems to alter restaurant menus, potentially putting customers at risk. Michael Scheuer, who was dismissed from his position as a menu production manager in June due to unspecified misconduct, found himself in the legal crosshairs after reportedly using his still-active work credentials to execute the unauthorized changes in early July.

Details of the Hack

According to court documents, Scheuer made significant alterations to the menu system, which Disney had contracted from another company. He changed all fonts to Wingdings symbols, rendering numerous menus unusable by propagating these changes throughout the database. This disruption forced Disney to restore backup systems to fix the damage, which lasted for a couple of weeks.

In addition to the font changes, Scheuer allegedly tampered with menus by removing critical allergen information, misleading customers about the safety of certain food items. This raised serious health concerns, particularly for people with allergies, as there was a risk of accidental exposure to allergens.

Political Manipulation

Scheuer further displayed his discontent by redirecting QR codes on menus to a political site calling for a boycott of Israel due to its actions in Gaza. Such modifications showcase not only the technical violations involved but also suggest an underlying motive linked to political grievances.

Denial of Service Attacks

Aside from altering menus, Scheuer is accused of launching Denial of Service (DoS) attacks against Disney employees he previously interacted with. By creating scripts to bombard login pages with incorrect attempts, he targeted these individuals, adding another layer of malicious activity to the case.

Investigation and Arrest

The FBI traced multiple VPN records back to Scheuer, revealing that he attempted to conceal his tracks while committing these intrusions. Evidence obtained during a search of his home included virtual machines used in the attacks and folders containing personal information of Disney employees targeted in the DoS incidents.

The FBI found that Scheuer had accessed Disney systems both during and after his employment and had even approached one of his DoS victims after being informed about an ongoing investigation into his Google account.

Legal Consequences

Charged with violating the Computer Fraud and Abuse Act, Scheuer faces serious legal ramifications. The charges suggest that he knowingly damaged a protected computer and caused financial loss exceeding $5,000. If convicted, he could be facing up to 15 years in prison, though a specific sentence will depend on the proceedings. As of now, he remains in custody awaiting a bond hearing, with no date set for the event.

For more detailed information, visit the original article from The Register: Original Source

Next Post Previous Post