Sunday , September 26 2021

Hacker known as “GhostExodus” sentenced to more than nine years in federal prison Unjust park | Dallas | Dallas Observer



For those who don’t remember the name of Jesse William McGraw, a brief update: he’s the 26-year-old Arlington man, formerly known as the GhostExodus of the Electronik Tribulation Army, who was arrested in June 2009 for hacking 14 computers into the WB Carrell Memorial. N. Central Highway Clinic, where he worked as a night shift security guard. According to the feds, McGraw broke into computers containing information about patients and those operating the air conditioning and intended to “use their compromised systems to commit additional crimes on or before July 4, 2009, a date that McGraw, according to the affidavit. , called “Devil’s.” McGraw, who was indicted a month later, was overthrown by posting his exploits on YouTube, where they were discovered by Mississippi State University computer science student Wesley McGrew.

In May last year, McGraw pleaded guilty to one count of two counts of transmitting a malicious code; the feds said he admitted he intended to use the bot to launch a denial of service attack on the website of a rival “hacker” group, “that rival was none other than Anonymous.

Still, in a letter he sent me from the Seagoville Federal Correctional Institution late last year, McGraw insisted he was not guilty of anything: “Sure, I’ve done my part in youthful positions.” he wrote, “but I’ve never manipulated patient records, I haven’t turned off an air conditioning system, I haven’t stolen identities or made people’s money.” He wrote that “hackers make police [sic] Internet “and that” ETA helped many innocent victims that Anonymous has terrorized. “

But the U.S. Attorney’s Office has just sent out news: McGraw was sentenced yesterday afternoon by U.S. District Judge Jane J. Boyle to 110 months for each of the two charges, for serving them simultaneously. Says the release, which follows in its entirety: “In reaching this sentence, Judge Boyle cited the need for those who commit computer crimes to understand the potentially devastating consequences of their actions, promote respect for the law, and deter others involved. o Judge Boyle ordered McGraw to return the occupants of the building affected by their criminal conduct, specifically the WB Carrell Memorial Clinic, the Central Center for Northern Surgery and the Cirrus Group. “

It follows the long recapitulation of the feds.

FORMER SECURITY GUARD, WHO HAS INTRAACKLAT

HOSPITAL COMPUTER SYSTEM,

IT IS SENTENCED TO 110 MONTHS OF FEDERAL PRESSURE

Defendant posted a video of himself

Engage a hospital’s computer system on YouTube

DALLAS – Jesse William McGraw, a former contract security guard at North Central Medical Plaza on the North Central Expressway in Dallas, who admitted to hacking the hospital’s computer systems, was sentenced yesterday afternoon by the district judge of the United States Jane J. Boyle to 110 months on each of the two charges, which will be served simultaneously, announced U.S. Attorney James T. Jacks of the North Texas District. In reaching that sentence, Judge Boyle mentioned the need for those who commit computer crimes to understand the potentially devastating consequences of their actions, promote respect for the law, and deter others involved or contemplate piracy. Judge Boyle ordered McGraw to restitute the occupants of the building affected by their criminal conduct, specifically the WB Carrell Memorial Clinic, the North Central Surgery Center, and the Cirrus Group.

In May 2010, McGraw, a / k / a “Ghost Exodus,” 26, of Arlington, Texas, pleaded guilty without a charge to an indictment accusing two of transmitting malicious code. He has been in custody since his arrest in June 2009.

During his shift from 11pm to 7am at North Central Medical Plaza, McGraw gained physical access to more than 14 computers, including a fifth-floor nursing station computer and heating, ventilation and air conditioning (HVAC). ) computer located in a locked room. The computer at the nursing station was used to track a patient’s progress through the Memorial Carrell Clinic, and medical staff also used it to refer to patients ’personal identifiers, to the records of billing and medical history. The HVAC computer was used to control the heating, ventilation and air conditioning of the first and second floors used by the North Central Surgery Center.

McGraw installed or transmitted a program to the computers he accessed that allowed him or anyone with his account name and password to remotely access the computers. It also damaged the integrity of some computer systems by removing security features, for example, by uninstalling antivirus programs, making computer systems and the related network more vulnerable to attacks. He also installed malicious code (sometimes called “bots”) on most computers. Robots are often associated with the theft of data from the compromised computer, the use of the computer compromised in denial of service (DDoS) attacks, and the use of the computer to send spam. McGraw knew that his actions would harm the security and integrity of computer equipment and systems. McGraw was the self-proclaimed leader of a hacking organization called the “Electronik Tribulation Army” (ETA). He advocated for compromising computers and computer systems in instructions he posted online for ETA members and others interested in engaging in computer fraud and engaging in DDoS attacks.

In this case, McGraw admitted that he intended to use robots and compromised equipment to launch DDoS attacks on the websites of rival hacker groups. ETA’s rival hacker groups included “Anonymous,” the hacker group that currently claims responsibility for attacks on PayPal and others in support of Wikileaks.

On February 12, 2009, McGraw abused the trust placed in him and ignored physical security in the locked room containing the HVAC computer. At approximately 11:35 p.m., he began downloading a password recovery tool from a website, which he used to recover passwords. On February 13, 2009, at approximately 1:19 a.m., McGraw, again without permission, physically accessed the HVAC computer and inserted a removable storage device and ran a program that allowed him to emulate a CD / DVD device. He remotely accessed the HVAC computer five times from April 13-14, 2009.

On April 28, 2009, around 1:45 a.m., McGraw abused the trust placed in him as a security guard and accessed the nursing station computer without permission. McGraw made a video and audio recording of what he called his “botnet infiltration.” While playing the song “Mission Impossible”, McGraw described his behavior step by step, unauthorized access to an office and a computer, inserting a CD containing the OphCrack program into the computer to prevent any password or security and inserting a removable storage device. on the computer that claimed to contain malicious code or program. The FBI found the CD containing the OphCrack program at McGraw’s home and found the source code for the bot on his laptop.

McGraw was aware that modifying the HVAC computer controls could affect the temperature of the installation. By affecting the facility’s environmental controls, it could have affected the treatment and recovery of patients vulnerable to environmental changes. In addition, it could have affected treatment regimens, including the effectiveness of all temperature-sensitive medications and supplies.

He was also aware that the computer at the nursing station was used to access and review medical records. While it states that it did not review or modify patient records, and that the government is not aware of any evidence to the contrary, having administrator access to such equipment would have had the ability to modify those records.

The case was investigated by the FBI and the Texas Attorney General’s Criminal Investigation Division. Assistant Prosecutor to U.S. Attorney CS Heath.




Source link