Feeds

Nuclear reactor sysadmin accused of hacking 220,000 US Navy sailors' details

We did it 'out of boredom' says alleged perp

Internet Security Threat Report 2014

A former US Navy sysadmin who worked in an aircraft carrier's nuclear reactor department has been charged with hacking into government networks using the USN's own computers.

Prosecutors have alleged that Nicholas Paul Knight, 27, of Chantilly, Virginia, and his co-accused, 20-year-old Daniel Trenton of Salem, Illinois, were leading members of a blackhat group called Team Digi7al.

Court papers seen by The Register describe Team Digi7al as a "criminal association organised to hack protected computers, steal sensitive and private information, make unauthorised public disclosures of that stolen... information and commit various other crimes related to its hacking activities".

Knight, from Virginia, is said to have learned how to to be a hacker at the age of 16 before enlisting in the US Navy, ending up as a systems administrator in the nuclear reactor department aboard the aircraft carrier USS Harry S. Truman.

It is alleged that he used Navy computers to carry out "unlawful Team Digi7al activities" and prosecutors said he was discharged after being caught trying to hack a naval database whilst at sea.

Krueger is accused of "performing much of the technical hacking work for Team Digi7al. He lives in Salem, Illinois, and studied network administration at a local college. He is also alleged to have operated Team Digi7al's Twitter account.

The US Attorney for the Northern District of Oklahoma said that "if convicted, Knight and Krueger face a maximum penalty of five years of imprisonment and a $250,000 fine, in addition to paying restitution to the victims of the crime".

Three other Team Digi7al hackers have been identified by the authorities, but they are not currently facing trial.

Prosecutors said: "Knight called himself a 'nuclear black hat' who fought for the people of the United States, not the government."

According to the prosecution, Krueger said he hacked naval computers "out of boredom", while another unnamed hacker said he broke into systems because it was "fun, and we can".

The pair are said to have used a number of pseudonyms. Knight is alleged to have gone under names like Interia, Logic and Solo while his co-accused is accused of modestly calling himself Thor, Chronus, Gambit or Orunu.

Their alleged targets include the USN's Navy-SWM database, containing private information about 220,000 USN sailors; the United States National Geospatial-Intelligence Agency, which provides mapping information to the military, and Los Alamos National Laboratory, the government-run institution which built the atomic bombs dropped on Hiroshima and Nagasaki at the end of World War Two.

Naval tech bods had to spend $514,000 to fix the problems caused by Team Digi7al's hack into the Navy's systems and even had to set up a call centre to help sailors who were affected by the attack.

Prosecutors said many of the hacks followed the same pattern. First, a team member scanned websites for security holes, taking "a particular interest in hacking government websites including military, educational, intelligence, homeland security and critical infrastructure".

Vulnerable targets would then be hit with a SQL code injection, prosecutors suggested, before the stolen data was uploaded to the cloud and links to the material published on Twitter.

According to the Wall Street Journal, the charges were contained in a document known as a criminal information, which usually indicates the defendants are going to plead guilty.

A trial date has not been set.

Team Digi7al, whoever they turn out to be, had a modest presence on Twitter. Its account is emblazoned with the slogan "behind you, lurking" beneath a logo which looks curiously corporate. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?