The federal indictment charges Lauri Love, 28, of Stradishall, England, with one count of accessing a U.S. department or agency computer without authorization and one count of conspiring to do the same.
An investigation led by the U.S. Army Criminal Investigation Command-Computer Crime Investigative Unit and the FBI in Newark revealed that Love allegedly illegally infiltrated U.S. government computer systems – including those of the U.S. Army, U.S. Missile Defense Agency, Environmental Protection Agency and National Aeronautics and Space Administration – resulting in millions of dollars in losses.
Law enforcement authorities in the United Kingdom, including investigators with the Cyber Crime Unit of the National Crime Agency (NCA), announced today that they arrested Love at his residence Friday, Oct. 25, 2013, in connection with an ongoing investigation by the NCA. Love was previously charged in New Jersey by federal complaint, also unsealed in connection with his arrest. He also is charged in a criminal complaint in the Eastern District of Virginia with alleged conduct related to other intrusions.
According to the indictment, between October 2012 and October 2013, Love and fellow conspirators sought out and hacked into thousands of computer systems. Once inside the compromised networks, Love and his conspirators placed hidden back doors within the networks, which allowed them to return to the compromised computer systems at a later date and steal confidential data.
The stolen data included the personally identifying information (PII) of thousands of individuals, some of whom were military servicemen and servicewomen, as well as other nonpublic material.
Love and his conspirators planned and executed the attacks in secure online chat forums. They communicated in these chats about identifying and locating computer networks vulnerable to cyber attacks and gaining access to and stealing massive amounts of data from those networks. They also discussed the object of the conspiracy, which was to hack into the computer networks of the government victims and steal large quantities of non-public data, including PII, to disrupt the operations and infrastructure of the United States government.
To gain entry to the government victims’ computer servers, Love and conspirators often deployed SQL injection attacks. They also exploited vulnerabilities in the Coldfusion web application platform. Like SQL Injection attacks, this method of hacking allowed the conspirators to gain unauthorized access to secure databases of the victims. Once the network was infiltrated, they created back doors, leaving the system vulnerable and helping them maintain access to the network.
According to the indictment, they breached the systems of the following organizations, and stole the following data:
Love and his conspirators took steps to conceal their identities and illegal hacking activities. To mask their IP addresses, the conspirators used proxy and Tor servers to launch the attacks. They also frequently changed their nicknames in online chat rooms, using multiple identities to communicate with each other.
If convicted, the defendant faces a maximum potential penalty of five years in prison and a $250,000 fine, or twice the gross gain or loss from the offense, on each of the two counts with which he is charged.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.