UK man charged with hacking Federal Reserve
The defendant is accused of stealing personal information of employees and publishing it on a website
IDG News Service - A British man faces new charges in the U.S. for allegedly hacking into the Federal Reserve Bank's servers and stealing names, email addresses and other personal information of the bank's computer users.
Lauri Love, already facing charges in New Jersey and Virginia, is charged with one count of computer hacking and one count of aggravated identity theft in U.S. District Court for the Southern District of New York, said Preet Bharara, the U.S. attorney there.
Documents charging Love in New York were unsealed Thursday.
"Lauri Love is a sophisticated hacker who broke into Federal Reserve computers, stole sensitive personal information, and made it widely available, leaving people vulnerable to malicious use of that information," Bharara said in a statement. "We place a high priority on the investigation and prosecution of hackers who intrude into our infrastructure and threaten the personal security of our citizens."
It was unclear who is representing Love in the U.S. cases.
Love used a SQL attack to infiltrate the bank's servers, according to a press release. In late December 2012, Love told other hackers in an IRC chat room that he had gained control of the server for the Federal Reserve Bank in Chicago, according to the indictment in New York. He also gained access to a Federal Reserve Bank server in New York, the U.S. Department of Justice alleged.
In later IRC chat sessions, Love told other hackers he had gained personal information of Federal Reserve employees and intended to make it public, the indictment alleges.
Love posted some personal information on a compromised website, according to Bharara's office.
The computer hacking carries a maximum term of 10 years in prison and the aggravated identity theft carries an additional sentence of two years in prison.
Love and coconspirators compromised several U.S. agencies, including NASA, the U.S. Defense Department's Missile Defense Agency, the U.S. Army's Network Enterprise Technology Command and the Environmental Protection Agency, according to the charges in New Jersey.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is firstname.lastname@example.org.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Exponentially Accelerate Data Protection and Recovery with Simpana 10 IntelliSnap® Snapshot Management Technology Are you making the best use of your storage array snapshot functionality? CommVault Simpana 10 IntelliSnap technology manages hardware-based snapshots across multiple vendor...
- Simpana IntelliSnap Technology Datasheet With IntelliSnap you can maximize the value of your snapshot technology while dramatically reducing management overhead and complexity.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts