Attacks/Breaches
5/8/2014
02:45 PM
50%
50%

Navy Nuclear Carrier Sysadmin Busted For Hacking Databases

Boredom cited as excuse for alleged hack campaign that may have compromised more than 30 government and private sites.

 

10 Ways To Fight Digital Theft & Fraud
10 Ways To Fight Digital Theft & Fraud
(Click image for larger view and slideshow.)

A former US Navy systems administrator is part of a group that's been charged with hacking into 30 different sites and stealing sensitive information, while working in the nuclear reactor department aboard the USS Harry S. Truman aircraft carrier.

A 22-page indictment filed this week in US District Court in Oklahoma charged alleged members of "Team Digi7al" with hacking and stealing sensitive information from sites run by the likes of the Department of Homeland Security, Los Alamos National Laboratory, Harvard University, AT&T U-verse, and the Toronto Police Department.

According to the indictment, the gang comprised at least five people: Nicholas Paul Knight (a.k.a. Inertia, Logic, nickmc01, Solo, INER7IA), 27, a former enlisted Navy member and self-described "nuclear black hat" who handled publicity; Daniel Trenton Krueger (Thor, Orunu, Gambit, Chronius, 7hor, G4mbi7), 20, a network administration student at an Illinois community college who handled the technical side; and three minors -- based in Alabama, Georgia, and Louisiana -- who performed technical hacking work.

If a Team Digi7al Pastebin post is to be believed, however, the group counted eight members: Logic, 7hor, Shr00mi3, Sp3ctrum, Ichi, Kalypto, Th1nkT0k3n, and ThePonyWizard.

[Those serving in the military are twice as likely to fall victim to identity theft as the general public. How can we mitigate the risk? Read Defending Against Identity Theft In The Military.]

Regardless, the group drew the attention of the Naval Criminal Investigative Service (NCIS) after the gang's members began posting to Twitter (@TeamDigi7al) links to dumps of partial personal information pertaining to 20 Navy personnel.

"So heres that #Dump i was talking about. #US #Navy was our target," read a June 17, 2012, post. About a week later, the group also posted a link to the Navy's Smart Web Move site. Launched in June 2001, the web-based service was developed

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Charlie Babcock
50%
50%
Charlie Babcock,
User Rank: Moderator
5/13/2014 | 6:58:16 PM
Rank amateurs
I'm glad were catching the rank amateurs, who boast of their exploits on Twitter. That's helpful to investigators. I wonder how we're doing against the true professionals.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
5/12/2014 | 11:54:59 AM
Re: Lack of PII security
Many organizations do not employ (citing cost or low risk) internal IDS/IPS.  I would be surprised if the Navy was any different.  Unfortunately, it will take many more of these insider events before companies take the issue more seriously.
electronbee
50%
50%
electronbee,
User Rank: Apprentice
5/9/2014 | 2:04:28 PM
Lack of PII security
The real reason for this was their sense of invincibility and not properly securing the network. Where is the IDS/IPS and the access control for the databases? Hello?
jwaters974
50%
50%
jwaters974,
User Rank: Apprentice
5/9/2014 | 1:06:57 PM
Re: Insider Threat
It seems the gravity of the crime and the potential sentences do not match up.

A clearly bad "risk : reward ratio" must exist to discourage this behavior. Five year sentences are reduced for good behavior but the bribes for info and hacking could well be worth it - considering the deep pockets of our adversaries... both state and non state actors.

Hacking military assets is the most serious crime anyone in the military could do- certainly more perilous to the services than an individual throwing down their rifle and deserting in battle. (Not participating in battle out of fear vs. swinging an advantage to the enemy by exposing personnel and information, sharing classified access with MINORS who don't know sqat about national security and its consequences all because you are bored).

Playing "black hat" on an aircraft carrier - potentially compromising the safety of the crew (and in the wrong scenario - possibly many other military and civillian personnel) and billions of dollars of taxpayers assets

- in this cloaked world of secretive and ongoing wars (physical and cyber), we are always at war - and so this crime seems worthy of capital punishment. As is the case for desertion in battle.

I'm just saying......

 

 
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/8/2014 | 3:45:44 PM
Insider Threat
Insider threats are always the hardest to defend, your employees have to be able to do the job they are hired to do but so often they are the ones who post the biggest risk.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?