Indicted man pleads guilty to hacking government supercomputers

Share this article:
Indicted man pleads guilty to hacking government supercomputers
Indicted man pleads guilty to hacking government supercomputers

A 24-year-old Pennsylvania man pleaded guilty this week to hacking government supercomputers and attempting to sell access to the networks.

Although the charges against him carry up to 20 years in prison, Andrew Miller of Devon may only face up to 18 months per a plea deal arranged in July. 

Miller took special care to gain entry to and remotely install backdoors in U.S. Department of Energy supercomputers, but the same thought was not put toward choosing a legitimate buyer when it came time to sell the login information he obtained.

The campaign began in 2008 when Miller – going by the online nickname “Green” – was a teenager. It was quashed years later by an undercover FBI agent to whom Miller intended to sell access to the government networks. An indictment was filed against Miller in June.

Miller had been looking to earn $50,000 for his efforts, but now faces fines upward of $750,000 after being charged with one count of conspiracy and two charges of computer intrusion.

Miller appears to have been the ringleader of the group, which called itself the Underground Intelligence Agency (UIA), which is charged with remotely accessing computers located in Massachusetts and elsewhere, and installing backdoors and creating passwords that provided root access to the networks, according to the indictment.

The team oftentimes leveraged this access to steal legitimate login credentials, which Miller and his cohorts then conspired to sell.

The FBI previously purchased access information to various other networks and domains for roughly $1,000 a piece, but the hammer was not dropped until July 2011 when Miller made an offer to the undercover FBI agent for root access credentials to Department of Energy supercomputers in California.

The credentials would let users tap into to the government science facility domain “nersc.gov,” according to the indictment.

“Because Miller's $50,000 price-tag was so steep, the FBI never transferred the money and therefore never obtained the NERSC log-in credentials,” according to a court document.

The indictment two other members of UIA: an unidentified individual using the nickname “Modem” or “Mod” and believed to hail from Australia, and a New York and Massachusetts resident named Robert Burns, going by the nickname “Intel.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.