Indicted man pleads guilty to hacking government supercomputers

Share this article:
Indicted man pleads guilty to hacking government supercomputers
Indicted man pleads guilty to hacking government supercomputers

A 24-year-old Pennsylvania man pleaded guilty this week to hacking government supercomputers and attempting to sell access to the networks.

Although the charges against him carry up to 20 years in prison, Andrew Miller of Devon may only face up to 18 months per a plea deal arranged in July. 

Miller took special care to gain entry to and remotely install backdoors in U.S. Department of Energy supercomputers, but the same thought was not put toward choosing a legitimate buyer when it came time to sell the login information he obtained.

The campaign began in 2008 when Miller – going by the online nickname “Green” – was a teenager. It was quashed years later by an undercover FBI agent to whom Miller intended to sell access to the government networks. An indictment was filed against Miller in June.

Miller had been looking to earn $50,000 for his efforts, but now faces fines upward of $750,000 after being charged with one count of conspiracy and two charges of computer intrusion.

Miller appears to have been the ringleader of the group, which called itself the Underground Intelligence Agency (UIA), which is charged with remotely accessing computers located in Massachusetts and elsewhere, and installing backdoors and creating passwords that provided root access to the networks, according to the indictment.

The team oftentimes leveraged this access to steal legitimate login credentials, which Miller and his cohorts then conspired to sell.

The FBI previously purchased access information to various other networks and domains for roughly $1,000 a piece, but the hammer was not dropped until July 2011 when Miller made an offer to the undercover FBI agent for root access credentials to Department of Energy supercomputers in California.

The credentials would let users tap into to the government science facility domain “nersc.gov,” according to the indictment.

“Because Miller's $50,000 price-tag was so steep, the FBI never transferred the money and therefore never obtained the NERSC log-in credentials,” according to a court document.

The indictment two other members of UIA: an unidentified individual using the nickname “Modem” or “Mod” and believed to hail from Australia, and a New York and Massachusetts resident named Robert Burns, going by the nickname “Intel.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

LEADS Act addresses gov't procedure for requesting data stored abroad

LEADS Act addresses gov't procedure for requesting data ...

Senators introduced the legislation last week as a means of amending the Electronic Communications Privacy Act (ECPA).

Report: Intrustion prevention systems made a comeback in 2013

Report: Intrustion prevention systems made a comeback in ...

A new report indicates that intrusion prevention systems grew 4.2 percent in 2013, with growth predicted to continue.

Mobile device security sacrificed for productivity, study says

Mobile device security sacrificed for productivity, study says

A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.