Your one-stop web resource providing safety and security information to manufacturers

A 23-year-old Pennsylvania resident is facing charges of trying to sell secret access to two U.S. government supercomputers for $50,000, a grand jury indictment said.

Police arrested Andrew James Miller, of Devon, PA, Thursday morning after an undercover FBI agent said Miller tried to sell secret access to the two U.S. government supercomputers.

British Hackers Face Jail Time
Jail Time for Ex-Intel Worker
Guilty: Scientist Sentenced for Espionage
Accused Hacker’s Day Job: IT Security

The supercomputers belong to the National Energy Research Scientific Computing Center (NERSC), which provides high-performance computing for research projects approved by the Department of Energy.

Its computers are some of the most powerful in the world, such as the “Hopper,” a Cray XE6 that ranked #5 in a list of the top 500 supercomputers in the world in 2010, and Carver, described as an IBM iDataPlex Linux cluster with 3,200 compute cores.

Schneider Bold

By its own admission, NERSC said it is a ripe target for hackers.

“Both because of our unique computing resources, and simply because we are a government institution, attackers target NERSC systems. In particular, smart attackers who have time and resources have been known to target our systems,” according to the organization’s website.

NERSC supports 4,000 user-accounts within the U.S. and internationally. But one of the rules says users should not store classified or national security related information, including any nuclear weapons-related data.

The indictment said Miller and an as-of-yet unindicted co-conspirator nicknamed “Intel” chatted online with an undercover FBI agent on April 16, 2011. The two were part of a hacking group known as the “Underground Intelligence Agency.”

Miller “stated that he accessed, earlier in the morning, two government super computers associated with the ‘’ domain,” the indictment reads. He also said he installed a backdoor that allowed him to consistently access several government networks.

“Miller then pasted a network notification banner and file system information into the chat to demonstrate his access to,” according to the indictment.

Less than a week later, Miller said he and his partner had access to half of the top 500 supercomputers, possessing some “root” access and other access credentials, mostly on “.gov” and “.edu” domains. In July last year, Miller “offered to sell” to the undercover FBI agent login credentials to for $50,000, the indictment said.

NERSC said on its website theft of user credentials is its “single greatest threat.” The institution uses an intrusion detection system called “Bro” which collects data from a modified version of (SSH) Secure Shell, an encrypted network protocol used for logging into a remote network. SSH is able to log into NERSC’s computational systems.

Miller also stands accused of installing backdoors, or programs that maintain persistent access, and obtaining login credentials for other organizations including, a service provider in Massachusetts; the University of Massachusetts-Amherst; and Crispin Porter and Bogusky (CPB Group), an advertising agency in Denver.

In the case of CPB Group, Miller faces charges of gaining access to two databases and a mail server. The company’s network contains databases for “many large, national databases,” the indictment said. The FBI wired $1,000 to Miller via Western Union for the data.

Miller also faces charges of conspiracy, two counts of computer fraud and access device fraud in U.S. District Court in Massachusetts. If convicted on all counts, he could face up to 30 years in prison, the Department of Justice said.

Pin It on Pinterest

Share This