Hacker and gamer Johnathan Poynter, 18, is responsible for the “Pokemon Go” exploit that has exploited a handful of school computers and taken the world by storm, earning him millions of new followers on Twitter.
His exploits are so well-received that they’ve even inspired a new documentary.
Poynnter’s exploits are now being used to “exploit” the Pokémon Go mobile game, in an apparent bid to steal personal information.
Poysnter said in a tweet that the exploit is “perfectly legal” and that he was “just a student.”
Pokemon Go, which has been downloaded more than 50 million times in the US, UK, Germany and Australia, uses a unique smartphone app to allow players to collect the “Pokéstops” and “pokémons” of their favourite fictional monsters and battle them in virtual arenas.
This has made it a hit with teens, and Poynster’s “Pokemon go” exploits have been used to capture and exploit data on students at several colleges in California and other states.
The school computers Poyson has used are in grades six through nine at the University of California, Davis, and the students at other campuses have complained about the abuse.
“The students have been trying to get access to their accounts,” a student at UC Davis told the San Francisco Chronicle.
“They’ve been told they have to log in, but they can’t do it because the password is ‘Pokemon.'”
“They’re trying to break into the computer, but there’s a lot of people in there who are scared to be found.
I’ve had to change passwords on my phone and I’ve also had to log into the network to get in,” another student at the school told the Chronicle.
The hacker has also exploited a number of different exploits to access social media accounts belonging to students.
“I’ve also used the exploit to hack into the Google accounts of a number, like Twitter, Facebook, and Instagram,” Poyner said in his tweet.
“But the best part is I have a password to the account.”
He also said that he had exploited a vulnerability in the PokémonGo API, which allows the game to send players to specific places and events in real time.
The PokemonGo exploit has been made possible by a vulnerability that was patched in October, but it still hasn’t been patched by the Pokémon Company, the developers of the game.
Puyons exploits are “perfect” in that they exploit a vulnerability, but the exploit he used to exploit it has been “perfect in that it exploits a vulnerability.”
The vulnerability that Poyners exploits can be seen in the screenshot above.
If you have any information on this story, please contact the Investigative Unit at the Department of Justice.
You can contact them at [email protected] or call 1-800-782-5326.