'BACK DOORS'
U.S. prosecutors said the
scheme involved the installation by Love and his co-conspirators of
malware in the hacked systems, creating "shells" and "back doors" that
allowed them to return later to steal data.
According to the U.S. indictment, Love, who was also known as "nsh" and
"route" and "peace," at times used internet chat rooms to discuss the
intrusions and efforts to conceal them.
In a
conversation dated Oct. 7, 2012, and described in the indictment, Love
discussed the hacking of an Army Corps database that might have yielded
400,000 email addresses, and asked a co-conspirator to "grab one email
for curiosity."
He told another co-conspirator
on July 31, 2013, after a hacking: "This ... stuff is really sensitive.
... It's basically every piece of information you'd need to do full
identity theft on any employee or contractor for the (agency)," the
indictment said.
Prosecutors said hacked systems
were located in places including Vicksburg, Mississippi, and the U.S.
Army's Aberdeen Proving Ground in Maryland, and also included a server
containing information about military personnel at Fort Monmouth in New
Jersey.
The U.S. Defense Department did not immediately comment on the matter.
No comments:
Post a Comment