Breach, Threat Management, Data Security, Malware

Indicted man pleads guilty to hacking government supercomputers

A 24-year-old Pennsylvania man pleaded guilty this week to hacking government supercomputers and attempting to sell access to the networks.

Although the charges against him carry up to 20 years in prison, Andrew Miller of Devon may only face up to 18 months per a plea deal arranged in July. 

Miller took special care to gain entry to and remotely install backdoors in U.S. Department of Energy supercomputers, but the same thought was not put toward choosing a legitimate buyer when it came time to sell the login information he obtained.

The campaign began in 2008 when Miller – going by the online nickname “Green” – was a teenager. It was quashed years later by an undercover FBI agent to whom Miller intended to sell access to the government networks. An indictment was filed against Miller in June.

Miller had been looking to earn $50,000 for his efforts, but now faces fines upward of $750,000 after being charged with one count of conspiracy and two charges of computer intrusion.

Miller appears to have been the ringleader of the group, which called itself the Underground Intelligence Agency (UIA), which is charged with remotely accessing computers located in Massachusetts and elsewhere, and installing backdoors and creating passwords that provided root access to the networks, according to the indictment.

The team oftentimes leveraged this access to steal legitimate login credentials, which Miller and his cohorts then conspired to sell.

The FBI previously purchased access information to various other networks and domains for roughly $1,000 a piece, but the hammer was not dropped until July 2011 when Miller made an offer to the undercover FBI agent for root access credentials to Department of Energy supercomputers in California.

The credentials would let users tap into to the government science facility domain “nersc.gov,” according to the indictment.

“Because Miller's $50,000 price-tag was so steep, the FBI never transferred the money and therefore never obtained the NERSC log-in credentials,” according to a court document.

The indictment two other members of UIA: an unidentified individual using the nickname “Modem” or “Mod” and believed to hail from Australia, and a New York and Massachusetts resident named Robert Burns, going by the nickname “Intel.”

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.