Feds Bust Hacker For Selling Government Supercomputer Access

  /     /     /  
Publicated : 22/11/2024   Category : security


Feds Bust Hacker For Selling Government Supercomputer Access


Pennsylvania man allegedly offered to sell login access to two Department of Energy supercomputers, as well as remote administration capabilities, for $50,000.



Mission Intelligence: NROs Newest Spy Satellites (click image for larger view and for slideshow)
The FBI last week announced the arrest of Andrew James Miller, 23, in Devon, Penn., on charges of hacking into numerous computers and selling stolen access credentials.
According to a grand jury indictment unsealed last week, Miller (a.k.a., Green, man, manual, libuuid, news, asfjp) was a member of a hacking group known as the Underground Intelligence Agency (UIA), and worked with another group member known as Intel, who wasnt indicted.
According to the indictment, from 2008 to 2011 Miller and others allegedly remotely hacked into computer networks belonging to RNK Telecommunications Inc., a Massachusetts company; Crispin Porter and Bogusky Inc., a Colorado advertising agency; the University of Massachusetts; the U.S. Department of Energy; and other institutions and companies.
Miller and other members of the conspiracy remotely, surreptitiously, and without authorization, installed backdoors onto computer servers and created magic passwords that provided root access to these compromised servers, according to the indictment. Miller and other members of the conspiracy sold, or otherwise transferred, these magic passwords and other stolen login credentials to others, including to an undercover agent from the Federal Bureau of Investigation.
[ Privacy Rights Clearinghouse has logged 266 breaches so far this year. Which are the worst? See
6 Biggest Breaches Of 2012
. ]
Authorities said that in February 2011, Miller offered to sell the undercover FBI agent root access to RNKs computer network in exchange for two $500 payments, sent through Western Union, and addressed to Andrew Miller in Lancaster, Penn. After an agent transferred the first $500, Miller provided the FBI [undercover agent] with the backdoor credentials and a list of hundreds of usernames and passwords that allowed root access to the RNK network. After transferring the other $500, authorities said that Miller then sold them access credentials for Crispin Porter and Bogusky, as well as the University of Massachusetts Amherst.
In April 16, 2011, meanwhile, the indictment said that Miller chatted with the undercover agent and said hed accessed two
nersc.gov
supercomputers owned by the National Energy Research Scientific Computer Center (NERSC), which provides computer resources for the U.S. Department of Energy. In July 2011, authorities said that for $50,000, he offered to sell the undercover agent login credentials to a series of computer networks that would enable remote access to the domain nersc.gov.
The charges filed against Miller include conspiracy, computer fraud, and access device fraud. If convicted of all charges, Miller faces up to 30 years in prison, as well as three years of supervised release, a $250,000 fine, and having to pay restitution.
Interestingly, the
NERSC website notes
that the type of data theft allegedly practiced by Miller is the centers top information security concern. Credential theft represents the single greatest threat to security here at NERSC, according to the site. We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile.
To help, the center said it uses a special version of
Secure Shell
(SSH) that makes it easier for the center to monitor session activity, as well as
investigate breaches
. The data collected with this version of SSH is sent to one of our security systems where it is analyzed by an intrusion detection system called Bro, according to NERSC. Using various signatures, some complex and some fairly simple, Bro is able to alert us when an account appears compromised. Furthermore, once a compromise is confirmed, the logs from this version of SSH will help us determine the extent of the compromise and what, precisely, the intruder did.
Geared specifically toward the federal government, its agencies, and third parties, FISMA is a set of requirements aimed at establishing a baseline level of computer and network security. In our
FISMA Lifts All Compliance Boats
report, we show that when you reach FISMA compliance, youll likely be compliant with just about every security mandate out there. (Free registration required.)

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Feds Bust Hacker For Selling Government Supercomputer Access