Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 2
Page 218
218 / 363
@ e p83 -2
To: Washington Field From: Mew Ys , bIE -3
SKLYAROV, a Russian computer programmer facing federal criminal
charges. LAMO used a free internet connection at KINKOS to commit the
hack. YAHOO! was informed of the breach after being contacted by
of securityfocus.com, who Was contacted by LAMO. b6 -2,5
was convicted in 1990's by the FBI for committing unauthor,7 > -2,5
computer intrusions. “ ’
In October 2001, LAMO contacted the reporter, ___—idsi
newsbytes.com to inform him that he had gained unauthorized access
into a MICROSOFT customer service database. LAMO had gained access to
MICROSOFT's database is September 2001 but choose not to disclose his
access until October 2001. TAMO utilized a vulnerability in
MICROSOFT!'s network that allowed an unpublished Internet Protocol (IP)
address to be entered into a web browser. The IP address provided
access to records of people who had bought products and services from
MICROSOFT. contacted MICROSOFT to ask them for a comment for
the story Hé was writing about the hack. This was the first instance,
i i OSOFT confirmed the hack and
described the incident as
"an error that led to a breach of privacy, against our privacy
policy".
In December 2001, LAMO contacted the reporter, C7
| securityfocus.com, to inform him that he had gained
unauthorized access into MCI WORLDCOM's internal network. LAMO gained
access to WORLDCOM's internal network in October 2001 but choose not
to disclose his access until December 2001. LAMO provided internal
screen captures to WORLDCOM to prove he was the hacker. The screen
captures from WORLDCOM's internal network state, "Not to be reproduced
in any manner or disclosed to unauthorized individuals". LAMO gained
access to WORLDCOM's internal network using a free internet connection
at KINKOS. LAMO exploited a vulnerability in a WORLDCOM proxy server
to gain unauthorized access to their network. After committing the
hack and reporting it told LAMO commented "The downside is, I'm
running out of major US Corporations". Also, one of LAMO's prized b6 -5
possessions is a screen capture of WORLDCOM's stock price falling 7
after he announced he had hacked the company. 7c -5
In February 2002, LAMO contacted the reporter,
newsbytes.com to inform him that he had gained unauthorized access
into SBC COMMUNICATIONS. LAMO gained access to SBC COMMUNICATIONS
network in December 2001 but choose not to disclose his access until
February 2002. LAMO utilized an exploit to gain access to SBC's
internal network. LAMO used a free internet connection at KINKO's to
perform the hack. LAMO gained access to usernames, passwords,
telephone numbers, addresses and other sensitive customer information.
. . In February 2002, LAMO discovered several misconfigured
proxy servers acting as doorways between the public Internet and the
\
FBI(19-cv-1495)-98
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic