Hacker pleads guilty to US Govt supercomputer attacks

By

Deal may mean only 18 months behind bars.

A 24-year-old US man has pleaded guilty to hacking US government supercomputers and attempting to sell access to the networks.

Hacker pleads guilty to US Govt supercomputer attacks

Although the charges against him carry up to 20 years in prison, Andrew Miller of Pennsylvannia may only face up to 18 months per a plea deal arranged in July. 

Miller took special care to gain entry to and remotely install backdoors in US Department of Energy supercomputers, but the same thought was not put toward choosing a legitimate buyer when it came time to sell the login information he obtained.

The campaign began in 2008 when Miller – going by the online nickname “Green” – was a teenager. It was quashed years later by an undercover FBI agent to whom Miller intended to sell access to the government networks. An indictment was filed against Miller in June.

Miller had been looking to earn US$50,000 for his efforts, but now faces fines upward of US$750,000 after being charged with one count of conspiracy and two charges of computer intrusion.

Miller appears to have been the ringleader of the group, which called itself the Underground Intelligence Agency (UIA). It is charged with remotely accessing computers located in Massachusetts and elsewhere, and installing backdoors and creating passwords that provided root access to the networks, according to the indictment.

The team often leveraged this access to steal legitimate login credentials, which Miller and his cohorts then conspired to sell.

The FBI previously purchased access information to various other networks and domains for roughly US$1000 a piece, but the hammer was not dropped until July 2011 when Miller made an offer to the undercover FBI agent for root access credentials to Department of Energy supercomputers in California.

The credentials would let users tap into to the government science facility domain “nersc.gov,” according to the indictment.

“Because Miller's US$50,000 price-tag was so steep, the FBI never transferred the money and therefore never obtained the NERSC log-in credentials,” according to a court document.

The indictment two other members of UIA: an unidentified individual using the nickname “Modem” or “Mod” and believed to hail from Australia, and a New York and Massachusetts resident named Robert Burns, going by the nickname “Intel.”

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?