Chinese Hackers Target National Datacenter in Watering Hole Spree
Full coverage |
Full coverage |
A UK man accused of breaking into computer systems operated by the US government has been rearrested on a recently filed extradition request, it has been widely reported.
Lauri Love, now 30, was arrested in October 2013 on charges he and associates hacked into networks operated by the US Army, the US Missile Defense Agency, NASA, the Environmental Protection Agency, and other US government agencies. The objective behind the hacking spree, US prosecutors said at the time, was to disrupt the operations and infrastructure of the US government by stealing large amounts of military data and personally identifying information of government employees and military personnel. “You have no idea how much we can fuck with the US government if we wanted to,” Love allegedly told a hacking colleague at one point.
Following the 2013 arrest, Love was released on bail. Earlier this week, he was rearrested on an extradition warrant on behalf of the US, The Guardian and other news organizations reported. Love’s attorney told reporters her client planned to fight the proceedings.
Read 2 remaining paragraphs | Comments
18 months after his arrest, the Turkish national accused of masterminding a worldwide string of ATM heists netting as much as $ 55 million has been sent to the US to face trial.
Naked Security – Sophos
Federal prosecutors have accused a UK man of hacking thousands of computer systems, many of them belonging to the US government, and stealing massive quantities of data that resulted in millions of dollars in damages to victims.
Lauri Love, 28, was arrested on Friday at his residence in Stradishall, UK following a lengthy investigation by the US Army, US prosecutors in New Jersey said. According to prosecutors, the attacks date back to at least October 2012. Love and other alleged hackers are said to have breached networks belonging to the Army, the US Missile Defense Agency, NASA, the Environmental Protection Agency, and others, in most cases by exploiting vulnerabilities in SQL databases and the Adobe ColdFusion Web application. The objective of the year-long hacking spree was to disrupt the operations and infrastructure of the US government by stealing large amounts of military data and personally identifying information of government employees and military personnel, a 21-page indictment said.
“You have no idea how much we can fuck with the US government if we wanted to,” Love told a hacking colleague in one exchange over Internet relay chat, prosecutors alleged. “This… stuff is really sensitive. It’s basically every piece of information you’d need to do full identity theft on any employee or contractor” for the hacked agency.
Read 6 remaining paragraphs | Comments