Examiner les modifications individuelles

De Wiki Dofus
Navigation du filtre anti-abus (Accueil | Modifications récentes des filtres | Examiner les modifications précédentes | Journal anti-abus)
Aller à la navigationAller à la recherche

Cette page vous permet d’examiner les variables générées par le filtre anti-abus pour une modification individuelle et de les tester avec les filtres.

Variables générées pour cette modification

VariableValeur
Nom du compte de l’utilisateur (user_name)
'DeannaGarland'
ID de la page (page_id)
0
Espace de noms de la page (page_namespace)
0
Titre de la page (sans l’espace de noms) (page_title)
'Fraudster Put Details Of Just Eat Customers Up For Sale On Dark Web'
Titre complet de la page (page_prefixedtitle)
'Fraudster Put Details Of Just Eat Customers Up For Sale On Dark Web'
Action (action)
'edit'
Résumé/motif de la modification (summary)
''
Ancien modèle de contenu (old_content_model)
''
Nouveau modèle de contenu (new_content_model)
'wikitext'
Texte wiki de l’ancienne page, avant la modification (old_wikitext)
''
Texte wiki de la nouvelle page, après la modification (new_wikitext)
'Grant West got hold of personal data of 165,000 Just Eat users over five months<br>A cyber criminal yesterday admitted touting the personal details of 165,000 Just Eat customers for sale on the dark web for use in a 'phishing' scam.<br>Grant West, 25, who lived in a caravan in Minster-on-Sea, Kent, used usernames and passwords stolen from third parties to access customer accounts. <br><br>The scam over a five-month period between July and December 2015 left Just Eat with a bill of around £210,000 in mitigation costs. <br><br>Similar attacks were launched against firms including Sainsbury's, Groupon, , T-Mobile and between August and September this year - after West was bailed.<br><br>West tried to get customers' 'Fullz' - typically made up of names, addresses, email addresses, passwords and [https://app.photobucket.com/search?query=credit%20card credit card] CVV numbers - which could then be sold. <br><br>He pleaded guilty at Southwark Crown Court to conspiracy to defraud Just Eat and its customers along with a string of other charges related to his dark web shop.<br> Grant West obtained personal data of 165,000 users of Just Eat (file image) over five months<br>A hacking charge states West launched 'brute force' attacks against 17 different [https://validcc.site websites like Validcc] using specialist software in a bid to obtain personal information.<br>Companies attacked included Asda, bookmakers Ladbrokes and Coral.<br><br>Other targets included Nectar.<br><br>West, who used the online identity 'Courvoisier', also sold cannabis, which was delivered to customers. Much of his business was carried out using Bitcoins.<br> RELATED ARTICLES <br><br><br><br>Share this article<br>Share<br><br><br>In May, he denied conspiring to defraud Just Eat and was released on bail, but continued his illicit online trade.<br>Police found around £25,000 in cash, along with hundreds of grams of cannabis, when they searched his property in August and September this year.<br>He appeared in the dock wearing a grey tracksuit and tapped his fingers as if he was typing on an imaginary keyboard.<br>His barrister, Anna Mackenzie, stood close by as he entered guilty pleas to ten charges.<br> West pleaded guilty at Southwark Crown Court (above) in London to conspiracy to defraud<br>West admitted two counts of conspiracy to defraud, one charge of computer hacking, four charges relating to the possession and supply of cannabis, two counts of possessing criminal property and one count of money laundering Bitcoins.<br>Judge Joanna Korner QC remanded him in custody and adjourned his sentencing to a later date.<br>After the case, a Just Eat spokesman said: 'We were made aware of a phishing scam which took place in 2015 and at the time took steps to mitigate this. <br>'This particular attack affected both Just Eat customers and non-customers.<br><br>At no point were Just Eat systems compromised or breached.<br>'Protecting our brand and our customers from online fraud is of utmost importance to us. We have a dedicated information security team. <br>'We do not store customer card details on our website or app and all payments are managed securely by an independent, external payment service provider.'<br>'
Horodatage Unix de la modification (timestamp)
1665221753