Feeds

Nuclear reactor sysadmin accused of hacking 220,000 US Navy sailors' details

We did it 'out of boredom' says alleged perp

Providing a secure and efficient Helpdesk

A former US Navy sysadmin who worked in an aircraft carrier's nuclear reactor department has been charged with hacking into government networks using the USN's own computers.

Prosecutors have alleged that Nicholas Paul Knight, 27, of Chantilly, Virginia, and his co-accused, 20-year-old Daniel Trenton of Salem, Illinois, were leading members of a blackhat group called Team Digi7al.

Court papers seen by The Register describe Team Digi7al as a "criminal association organised to hack protected computers, steal sensitive and private information, make unauthorised public disclosures of that stolen... information and commit various other crimes related to its hacking activities".

Knight, from Virginia, is said to have learned how to to be a hacker at the age of 16 before enlisting in the US Navy, ending up as a systems administrator in the nuclear reactor department aboard the aircraft carrier USS Harry S. Truman.

It is alleged that he used Navy computers to carry out "unlawful Team Digi7al activities" and prosecutors said he was discharged after being caught trying to hack a naval database whilst at sea.

Krueger is accused of "performing much of the technical hacking work for Team Digi7al. He lives in Salem, Illinois, and studied network administration at a local college. He is also alleged to have operated Team Digi7al's Twitter account.

The US Attorney for the Northern District of Oklahoma said that "if convicted, Knight and Krueger face a maximum penalty of five years of imprisonment and a $250,000 fine, in addition to paying restitution to the victims of the crime".

Three other Team Digi7al hackers have been identified by the authorities, but they are not currently facing trial.

Prosecutors said: "Knight called himself a 'nuclear black hat' who fought for the people of the United States, not the government."

According to the prosecution, Krueger said he hacked naval computers "out of boredom", while another unnamed hacker said he broke into systems because it was "fun, and we can".

The pair are said to have used a number of pseudonyms. Knight is alleged to have gone under names like Interia, Logic and Solo while his co-accused is accused of modestly calling himself Thor, Chronus, Gambit or Orunu.

Their alleged targets include the USN's Navy-SWM database, containing private information about 220,000 USN sailors; the United States National Geospatial-Intelligence Agency, which provides mapping information to the military, and Los Alamos National Laboratory, the government-run institution which built the atomic bombs dropped on Hiroshima and Nagasaki at the end of World War Two.

Naval tech bods had to spend $514,000 to fix the problems caused by Team Digi7al's hack into the Navy's systems and even had to set up a call centre to help sailors who were affected by the attack.

Prosecutors said many of the hacks followed the same pattern. First, a team member scanned websites for security holes, taking "a particular interest in hacking government websites including military, educational, intelligence, homeland security and critical infrastructure".

Vulnerable targets would then be hit with a SQL code injection, prosecutors suggested, before the stolen data was uploaded to the cloud and links to the material published on Twitter.

According to the Wall Street Journal, the charges were contained in a document known as a criminal information, which usually indicates the defendants are going to plead guilty.

A trial date has not been set.

Team Digi7al, whoever they turn out to be, had a modest presence on Twitter. Its account is emblazoned with the slogan "behind you, lurking" beneath a logo which looks curiously corporate. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.