Feeds

Feds: Hospital hacker's 'massive' DDoS averted

Arrest foils 'Devil's Day' scheme

Internet Security Threat Report 2014

GhostExodus outed

In some respects, McGraw's hacking regimen bordered on the paranoid. He kept a webcam over the outside door to his one-bedroom apartment so he'd know in advance when someone was calling on him. But otherwise, court documents portray someone who was sloppy in covering his tracks. The picture on a fake FBI credential he showed in one video matched the photo on his driver's license. Another video in which GhostExodus showed off Wireshark and other hacking tools revealed an IRC session that revealed an IP address issued by swbell.net.

His need for attention led him to volunteer a wealth of information about himself. A profile here made in March lists his age as 24 and shows the face of a white male that is identical to the one belonging to the individual McGrew says he observed in the hospital videos. (Those clips have since been taken down).

Combining the IP address with a Craigslist posting and GhostExodus's YouTube videos, McGrew soon deduced the miscreant probably was a night security guard at Carrell Clinic.

GhostExodus's tell-tale screen capture

Besides breaching the security of the hospital, McGraw also posted evidence that he accessed a computer used by the aviation unit of the Dallas Police Department. Police officials confirmed that a machine assigned to that unit was known "to have been compromised by an unauthorized individual."

McGrew - who despite the name similarity has no relation to McGraw - first learned of the HVAC breach after someone from Electronik Tribulation Army sent him an unsolicited instant message on June 18 bragging of the exploit. The message pointed to screenshots that suggested it wasn't a hoax. With a specialty in SCADA, or supervisory control and data acquisition, McGrew quickly took notice. Three days later he tipped off the Texas Attorney General's office and the FBI.

"I can't just see that and let that go," he said. "I spent the entire weekend trying to find out as much about GhostExodus as possible."

Of particular concern was the sinking realization that someone had unauthorized access to the system that controls the air-conditioning systems that cool operating rooms and other critical areas of the Texas hospital, where temperatures regularly hit the triple digits.

"Elements of critical infrastructure, like HMIs for control systems in hospitals have such low security that even someone like this can get in," he said. "It really shows how dangerous even a low-skilled attacker can be." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.