Latest news with #TroyHunt
Yahoo
6 days ago
- General
- Yahoo
Gang members sentenced to life for murder of Gwinnett businessman at his home
The Brief A Gwinnett County judge has sentenced two men to life in prison for the murder of the owner of a local check-cashing business in 2019. Investigators say the two members of the "Goodfellas" street gang used a tracking device to follow their victim home in an attempt to rob him that went wrong. One person arrested for the crime died in custody from a drug overdose. The fourth suspect remains unidentified. GWINNETT COUNTY, Ga. - Two men will spend the rest of their lives behind bars after they were found guilty of murder in the 2019 death of the owner of a local check-cashing business. Prosecutors say 37-year-old Daquan Rashad Clarke and 44-year-old Troy Anthony Hunt were among a group of four men who targeted the owner of the DeKalb County business in his home in Gwinnett County. What we know Officials said on Oct. 4, 2019, Clarke, Hunt, Ian Jabar Longshore, and a fourth man followed 55-year-old Sukkee Hong to his Sugar Hill home. According to investigators, the group, all members of the "Goodfellas" street gang, had identified Hong's business, TME Check Cashing, as one of several that they wanted to rob. Clarke's girlfriend, Subriccia S. Moss, bought a tracking device on the internet and distracted Hong while the men put the device on his car. On that night, prosecutors said Hunt and the unidentified man followed Hong into his garage while Clarke and Longshore waited in getaway cars. Video surveillance showed the two men racing out of the garage after firing shots. They took with them a bag from Hong's car that had documents and the victim's cell phone. Detectives say they identified three of the four men using mobile phone data and DNA evidence collected from the crime scene. What they're saying "We stand with the family and loved ones of Mr. Sukke Hong and continue to grieve his loss," District Attorney Patsy Austin-Gatson said. "We thank the jury for returning a verdict which gives Mr. Hong's family justice. Violent gang activity is unacceptable in Gwinnett County, and we will always hold those who commit crimes like these accountable to the fullest extent of the law." Dig deeper Earlier this month, a Gwinnett County jury found Clarke and Hunt guilty of two counts of felony murder, aggravated assault, armed robbery, and four counts of violation of Georgia's Street Gang Terrorism and Prevention Act. Hunt was also found guilty of possession of a firearm during the commission of a felony. Clarke was sentenced to life in prison without the possibility of parole plus 80 years. Hunt was sentenced to life in prison without the possibility of parole plus 30 years. Investigators are still working to identify the fourth man. The Source Information for this story was taken from a release by the Gwinnett County District Attorney's Office.
Yahoo
13-05-2025
- Yahoo
2 men found guilty in murder of Gwinnett County business owner
Two men are going to prison for a deadly home invasion that began with a tracking device and ended with a business owner shot in his garage. The murder was part of an elaborate plot with as many as five people involved that prosecutors say targeted Asian business owners in 2019. A Gwinnett County jury found Daquan Clarke and Troy Hunt guilty of murder nearly five years after the victim was ambushed in his own garage. Prosecutors say the men stalked Sukke Hong, 49, who owned a check-cashing store in DeKalb County. [DOWNLOAD: Free WSB-TV News app for alerts as news breaks] They say Clarke and Hunt were part of the 'Goodfellas' street gang and planned to rob Hong. Hong had just pulled into his garage in Sugar Hill when two men followed him inside. Police say they shot him, then stole a bag of documents and his cell phone. Investigators used DNA evidence and cell phone data to place Clarke and Hunt at the scene. They also say Clarke's girlfriend helped set the plan in motion. Investigators say Subriccia S. Moss, 38, admitted that she distracted Hong inside his store while Clarke planted a tracker on his car. Prosecutors say she later acted as a lookout. She's now serving a 15-year prison sentence for armed robbery and aggravated assault. TRENDING STORIES: GA student taken into ICE custody after traffic stop pulled over by mistake, police say Georgia's Most Wanted Georgia AG announces Brookhaven woman convicted in $305K Medicaid fraud scheme Atlanta police first found Moss after a shooting at The Chill Spot nightclub, where officers say she fired a gun into the air during a fight. That arrest led Gwinnett detectives to unravel her and Clarke's role in the deadly robbery plot. In Gwinnett County, a third suspect in the murder died in jail from a drug overdose. A fourth suspect still hasn't been found. In a statement, Gwinnett County District Attorney Patsy Austin-Gatson said: 'We stand with the family and loved ones of Mr. Sukke Hong and continue to grieve his loss. We thank the jury for returning a verdict which gives Mr. Hong's family justice. Violent gang activity is unacceptable in Gwinnett County, and we will always hold those who commit crimes like these accountable to the fullest extent of the law.' Anyone who may know where that unknown fourth murder suspect may be is urged to call Gwinnett County police. [SIGN UP: WSB-TV Daily Headlines Newsletter]
Yahoo
20-03-2025
- Yahoo
Data breach at stalkerware SpyX affects close to 2 million, including thousands of Apple users
A consumer-grade spyware operation called SpyX was hit by a data breach last year, TechCrunch has learned. The breach reveals that SpyX and two other related mobile apps had records on almost two million people at the time of the breach, including thousands of Apple users. The data breach dates back to June 2024 but has not been previously reported, and there is no indication that SpyX's operators ever notified its customers or those targeted by the spyware. The SpyX family of mobile spyware is now, by our count, the 25th mobile surveillance operation since 2017 known to have experienced a data breach, or otherwise spilled or exposed their victims' or users' data, showing that the consumer-grade spyware industry continues to proliferate and put people's private data at risk. The breach also provides a rare look at how stalkerware like SpyX can also target Apple customers. Troy Hunt, who runs data breach notification site Have I Been Pwned, received a copy of the breached data in the form of two text files, which contained 1.97 million unique account records with associated email addresses. Hunt said the vast majority of the email addresses are associated with SpyX. The cache also includes less than 300,000 email addresses associated with two near-identical clones of the SpyX app called MSafely and SpyPhone. About 40% of the email addresses were already in Have I Been Pwned, Hunt said. As with previous spyware breaches, Hunt marked the SpyX data breach in Have I Been Pwned as 'sensitive,' which allows only the person with an affected email address to see if their information is part of this breach. The operators behind SpyX did not respond to emails from TechCrunch with questions about the breach, and a WhatsApp number listed on SpyX's website returned a message saying it was not registered with the messaging app. SpyX is billed as mobile monitoring software for Android and Apple devices, ostensibly for granting parental control of a child's phone. Surveillance malware, like SpyX, also go by the term stalkerware (and spouseware) because sometimes the operators explicitly promote their products as a way to spy on a spouse or domestic partner, which is broadly illegal without that person's knowledge. Even when the operators don't explicitly promote this illegal use, spyware apps share much of the same stealthy data-stealing capabilities. Consumer-grade spyware, like stalkerware, usually works in one of two ways. Apps that work on Android devices, including SpyX, are typically downloaded from outside of the official Google Play app store and require someone with physical access to a victim's device — usually with knowledge of their passcode — to weaken its security settings and plant the spyware. Apple has stricter rules about which apps can be on the App Store and run on iPhones and iPads, so stalkerware usually taps into a copy of the device's backup found on Apple's cloud storage service, iCloud. With a person's iCloud credentials, stalkerware can continuously download the victim's most recent backup directly from Apple's servers. iCloud backups store the majority of a person's device data, including messages, photos, and app data. According to Hunt, one of the two files in the breached cache referred to iCloud in its filename and contained about 17,000 distinct sets of plaintext Apple Account usernames and passwords. Since the iCloud credentials in the breached cache clearly belonged to Apple customers, Hunt sought to confirm the authenticity of the data by reaching out to Have I Been Pwned subscribers whose Apple Account email addresses and passwords were found in the data. Hunt said several people confirmed that the information he provided was accurate. Given the possibility of an ongoing risk to victims whose account credentials might still be valid, Hunt provided the list of breached iCloud credentials to Apple prior to publication. Apple did not comment when reached by TechCrunch. As for the rest of the email addresses and passwords found in the breached text files, it was less clear if these were working credentials for any service other than SpyX and its clone apps. Meanwhile, Google pulled down a Chrome extension linked to the SpyX campaign. 'Chrome Web Store and Google Play Store policies clearly prohibit malicious code, spyware and stalkerware, and if we find violations, we take appropriate action. If a user suspects their Google Account has been compromised, they should take recommended steps immediately to secure it," Google spokesperson Ed Fernandez told TechCrunch. TechCrunch has a spyware removal guide for Android users that can help you identify and remove common types of phone monitoring apps. Remember to have a safety plan in place, given that switching off the app may alert the person who planted it. For Android users, switching on Google Play Protect is a useful security feature that can help to protect against Android malware, including unwanted phone surveillance apps. You can enable Google Play from the app's settings if it isn't already enabled. Google accounts are far more protected with two-factor authentication, which can better protect against account and data intrusions, and know what steps to take if your Google account is compromised. iPhone and iPad users can check and remove any devices from your account that you don't recognize. You should ensure that your Apple account uses a long and unique password (ideally saved in a password manager) and that your account also has two-factor authentication switched on. You should also change your iPhone or iPad passcode if you think someone may have physically compromised your device. If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware has resources if you think your phone has been compromised by spyware. Sign in to access your portfolio