Pennsylvania man allegedly offered to sell login access to two Department of Energy supercomputers, as well as remote administration capabilities, for $50,000.

Mathew J. Schwartz, Contributor

June 21, 2012

4 Min Read

Mission Intelligence: NRO's Newest Spy Satellites

Mission Intelligence: NRO's Newest Spy Satellites


Mission Intelligence: NRO's Newest Spy Satellites (click image for larger view and for slideshow)

The FBI last week announced the arrest of Andrew James Miller, 23, in Devon, Penn., on charges of hacking into numerous computers and selling stolen access credentials.

According to a grand jury indictment unsealed last week, Miller (a.k.a., Green, man, manual, libuuid, news, asfjp) was a member of a hacking group known as the Underground Intelligence Agency (UIA), and worked with another group member known as "Intel," who wasn't indicted.

According to the indictment, from 2008 to 2011 "Miller and others allegedly remotely hacked into computer networks belonging to RNK Telecommunications Inc., a Massachusetts company; Crispin Porter and Bogusky Inc., a Colorado advertising agency; the University of Massachusetts; the U.S. Department of Energy; and other institutions and companies."

"Miller and other members of the conspiracy remotely, surreptitiously, and without authorization, installed 'backdoors' onto computer servers and created 'magic passwords' that provided 'root' access to these compromised servers," according to the indictment. "Miller and other members of the conspiracy sold, or otherwise transferred, these 'magic passwords' and other stolen login credentials to others, including to an undercover agent from the Federal Bureau of Investigation."

[ Privacy Rights Clearinghouse has logged 266 breaches so far this year. Which are the worst? See 6 Biggest Breaches Of 2012. ]

Authorities said that in February 2011, Miller offered to sell the undercover FBI agent "root access to RNK's computer network" in exchange for two $500 payments, sent through Western Union, and addressed to "Andrew Miller" in Lancaster, Penn. After an agent transferred the first $500, "Miller provided the FBI [undercover agent] with the backdoor credentials and a list of hundreds of usernames and passwords that allowed root access to the RNK network." After transferring the other $500, authorities said that Miller then sold them access credentials for Crispin Porter and Bogusky, as well as the University of Massachusetts Amherst.

In April 16, 2011, meanwhile, the indictment said that Miller chatted with the undercover agent and said he'd accessed two nersc.gov supercomputers owned by the National Energy Research Scientific Computer Center (NERSC), which provides computer resources for the U.S. Department of Energy. In July 2011, authorities said that for $50,000, he offered to sell the undercover agent "login credentials to a series of computer networks that would enable remote access to the domain 'nersc.gov.'"

The charges filed against Miller include conspiracy, computer fraud, and access device fraud. If convicted of all charges, Miller faces up to 30 years in prison, as well as three years of supervised release, a $250,000 fine, and having to pay restitution.

Interestingly, the NERSC website notes that the type of data theft allegedly practiced by Miller is the center's top information security concern. "Credential theft represents the single greatest threat to security here at NERSC," according to the site. "We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile."

To help, the center said it uses a special version of Secure Shell (SSH) that makes it easier for the center to monitor session activity, as well as investigate breaches. "The data collected with this version of SSH is sent to one of our security systems where it is analyzed by an intrusion detection system called Bro," according to NERSC. "Using various signatures, some complex and some fairly simple, Bro is able to alert us when an account appears compromised. Furthermore, once a compromise is confirmed, the logs from this version of SSH will help us determine the extent of the compromise and what, precisely, the intruder did."

Geared specifically toward the federal government, its agencies, and third parties, FISMA is a set of requirements aimed at establishing a baseline level of computer and network security. In our FISMA Lifts All Compliance Boats report, we show that when you reach FISMA compliance, you'll likely be compliant with just about every security mandate out there. (Free registration required.)

About the Author(s)

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights