A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
Andrew Miller, 24, pleaded guilty in August to one count of conspiracy and two counts of computer fraud for actions committed between 2008 and 2011, when he was part of the Underground Intelligence Agency hacking group, the U.S. Department of Justice said Thursday. Miller was sentenced Wednesday.
Miller asked an undercover FBI agent in 2011 for US$50,000 in exchange for access to two supercomputers at the Lawrence Livermore National Laboratory, according to the DOJ.
The Oakland, California, lab is focused on national and global defense and its work includes biosecurity, counterterrorism, nuclear energy, intelligence and military weapons. The supercomputers Miller claimed he had accessed were part of the lab's National Energy Research Scientific Computing Center (NERSC).
According to court documents, the FBI never "bought" the access credentials for the lab, but it did obtain from Miller proof that he had accessed two supercomputers that provide computing resources for the U.S. Department of Energy. He told the FBI got the access after breaking into a Japanese university with connections to the NERSC.
The FBI did buy from Miller access to computer servers from RNKTel.com, a Massachusetts telecommunications provider. Miller also sold to the undercover agents access to servers from Colorado ad agency Crispin Porter and Bogusky which hosted websites, databases and email servers from a variety of merchants, including from Domino's Pizza.
The FBI also bought from Miller what court documents describe as a "massive database of thousands of log-in credentials into hundreds of computer networks" which he said he obtained by hacking into servers from Layered Tech, a Texas Internet service provider.
Miller's modus operandi consisted of breaking into computer networks via a variety of methods, including targeting specific authorized network users and infecting their computers with malware, which allowed him to steal their log-in information.
Then, once inside the network, he would look for valuable information, such as log-in information from other users, and he would install "backdoors" with his own passwords. This allowed him to return to the networks while bypassing security and to potentially sell access to them to cybercriminals.
In computer chats with the undercover agents, Miller claimed to have hacked into servers from American Express, Yahoo, Google, Adobe, Wordpress, Cisco, Harvard University and the University of California at Davis. He also claimed to have accessed very sensitive U.S. government networks from agencies including NASA, Los Alamos National Laboratory, Oak Ridge National Laboratory and Argonne National Laboratory.
In a filing with the court in November, Massachusetts U.S. Attorney Carmen Ortiz called Miller's actions "widespread, persistent and pernicious hacking" and said he was aware he was breaking the law, but she also said it's not clear how much actual damage he caused.
Sign up for CIO Asia eNewsletters.