Attacks/Breaches

1/8/2016
06:30 PM
50%
50%

Former St. Louis Cardinals Exec Pleads Guilty To Cyber Espionage Charges

Cardinals' former director of baseball development confesses to accessing Houston Astros' computers without authorization.

The former director of baseball development for the St. Louis Cardinals, a Major League Baseball (MLB) team, pleaded guilty today to hacking the systems of the Houston Astros, a competing MLB team.

News broke in mid-June that the FBI was investigating the Cardinals in connection with the intrusion. Christopher Correa, 35, St. Louis -- who was employed by the team from 2009 until July 2015 -- confessed to the intrusion, and to unauthorized access of "Ground Control," the Astros' confidential, proprietary database of statistics, scouting reports, and trade discussions. The total intended loss for all of the intrusions is approximately $1.7 million, according to the U.S. Department of Justice.

The incident is the first known of its kind in the sports world, and a wake-up call that industrial cyber espionage is alive and can affect any industry. 

According to the DOJ release:

In one instance, Correa was able to obtain an Astros employee’s password because that employee has previously been employed by the Cardinals. When he left the Cardinals organization, the employee had to turn over his Cardinals-owned laptop to Correa – along with the laptop’s password. Having that information, Correa was able to access the now-Astros employee’s Ground Control and e-mail accounts using a variation of the password he used while with the Cardinals.

Correa was charged with five counts of unauthorized access of a protected computer. Each conviction carries a maximum possible sentence of five years in federal prison and a possible $250,000 fine. Sentencing is set for April 11.

No other members of the Cardinals' organization were charged.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/12/2016 | 8:27:50 AM
Intent
From all the information gathered, were any malicious actions performed before he was caught? If so, what were they? If not, is there any reasonable speculation as to what he planned to do with the data?
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.