Vulnerabilities / Threats

4/7/2016
01:30 PM
50%
50%

Hacker From Oklahoma Pleads Guilty In DDoS Attack Case

Oklahoma City man faces up to 10 years in federal prison for a hacking attempt targeting a cybersecurity company.

Benjamin Earnest Nichols, a 37-year-old from Oklahoma City, has pleaded guilty to waging a distributed denial of service (DDoS) attack against mcgrewsecurity.com in 2010. Nichols has not been sentenced yet, but could face 10 years in federal prison and a $250,000 fine, DOJ reports.

In 2010, Nichols, a member of the hacking group Electronic Tribulation Army (ETA), confessed to attacking a protected computer system in the mcgrewsecurity.com incident, causing losses up to $6,500.  

According to DOJ, Jesse McGraw, the leader of ETA hacking group and ex-security guard at Medical Plaza in Dallas, was charged with hacking into protected computers in the medical facility, and received a sentence of more than nine years in federal prison.

After McGraw's arrest, Nichols took offense with comments about the case posted on mcgrewsecurity.com blog. He then harrassed online the owner of the mcgrewsecurity.com website, RWM, by setting up what DoJ described as a "derogatory website" and built a bot to auto-respond with insults and profanity to RWM's Internet Relay Chat.

The FBI is investigating the case.

See more on the case in the Department of Justice release

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BenjaminN508
50%
50%
BenjaminN508,
User Rank: Apprentice
7/4/2016 | 3:05:48 PM
Correction.
I actually from California, and I hate Oklahoma, but thanks for presuming the place of my supposed Origin.
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounde...