Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 1
Page 203
203 / 444
d n.2 ©
To: New York From: New York
LAMO had gained access to MICROSOFT's database is September 2001
but choose not to disclose his access until October 2001. LAMO
utilized a vulnerability in MICROSOFT's network that allowed an
unpublished Internet Protocol (IP) address to be entered into a
web browser. The IP address provided access to records_of people
who had bought products and services from MICROSOFT.
6 -5
contacted MICROSOFT to ask them for a comment for the story he bo -5
was writing about the hack. This was the first instance, DIC -5
MICROSOFT learned of the intrusion. MICROSOFT confirmed the hack
and described the
incident as "an error that led to a breach of privacy, against
our privacy policy".
In December 2001, LAMO contacted the reporter, |
em to inform him that he had gained
unauthorized access into MCI WORLDCOM's internal network. LAMO
gained access to WORLDCOM's internal network in October 2001 but
choose not to disclose his access until December 2001. LAMO
provided internal screen captures to WORLDCOM to prove he was the b6 -5
hacker. The screen captures from WORLDCOM's internal network c
state, "Not to be reproduced in any manner or disclosed to bic -5
unauthorized individuals". LAMO gained access to WORLDCOM's
internal network using a free internet connection at KINKOS.
LAMO exploited a vulnerability in a WORLDCOM proxy server to gain
unauthorized access to their network. After committing the hack
and reporting it to[____] LAMO commented "The downside is, I'm
running out of major US Corporations". Also, one of LAMO's
prized possessions is a screen capture of WORLDCOM's stock price
falling after he announced he had hacked the company.
2002, LAMO contacted the reporter,[_—
to inform him that he had gained
unauthorized access into SBC COMMUNICATIONS. LAMO gained access
to SBC COMMUNICATIONS network in December 2001 but choose not to
disclose his access until February 2002. WLAMO utilized an .
exploit to gain access to SBC's internal network. LAMO used a b6 -5
free internet connection at KINKO's to perform the hack. LAMO b7C -5
gained access to usernames, passwords, telephone numbers,
addresses and other sensitive customer information.
In February 2002, LAMO discovered several misconfigured
proxy servers acting as doorways between the public Internet and
the NEW YORK TIMES private intranet. LAMO contacted of
to inform him that he had gained unauthorized
access Into ie W YORK TIMES intranet. LAMO utilized the proxy
servers to gain access to the NEW YORK TIMES network.’ Once on
the network, LAMO cracked a password for a userid with supervisor
rights. Utilizing this userid he was able to broaden his access
as well as perform certain functions within the network. LAMO
FBI(19-cv-1495)-269
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic