British hacker accused of illegal access to US military networks

'BACK DOORS'
 
U.S. prosecutors said the scheme involved the installation by Love and his co-conspirators of malware in the hacked systems, creating "shells" and "back doors" that allowed them to return later to steal data.
 
According to the U.S. indictment, Love, who was also known as "nsh" and "route" and "peace," at times used internet chat rooms to discuss the intrusions and efforts to conceal them.
 
In a conversation dated Oct. 7, 2012, and described in the indictment, Love discussed the hacking of an Army Corps database that might have yielded 400,000 email addresses, and asked a co-conspirator to "grab one email for curiosity."
 
He told another co-conspirator on July 31, 2013, after a hacking: "This ... stuff is really sensitive. ... It's basically every piece of information you'd need to do full identity theft on any employee or contractor for the (agency)," the indictment said.
 
Prosecutors said hacked systems were located in places including Vicksburg, Mississippi, and the U.S. Army's Aberdeen Proving Ground in Maryland, and also included a server containing information about military personnel at Fort Monmouth in New Jersey.
 
The U.S. Defense Department did not immediately comment on the matter.

No comments:

Post a Comment