Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 2
Page 69
69 / 363
vos oasis nate ooo SS |
To: Detroit From: New Yo |
re: [07/02/2003 b3 -2
"an error that led to a breach of privacy, against our privacy
policy". b6 -5
er 2001, LAMO contacted the ee — bic -5
to inform him that he had gaine
Unauthorized access into MCL WORLDCOM's internal network. LAMO gained
access to WORLDCOM's internal network in October 2001 but choose not
to disclose his access until December 2001. LAMO provided internal
screen captures to WORLDCOM to prove he was the hacker. The screen
captures from WORLDCOM's internal network state, "Not to be reproduced
in any manner or disclosed to unauthorized individuals". LAMO gained
access to WORLDCOM's internal network using a free internet connection
at KINKOS. LAMO exploited a vulnerability in a WORLDCOM proxy server
to gain unauthorized access to their network. After committing the
hack and reporting it to[____] LAMO commented "The downside is, I'm
running out of major US Corporations". Also, one of LAMO's prized
possessions is a screen capture of WORLDCOM's stock price falling
after he announced he had hacked the company.
In February 2002, LAMO contacted thf eee -5
newsbytes.com to inform him that he had gained unauthorized access b7C -5
into SBC COMMUNICATIONS. LAMO gained access to SBC COMMUNICATIONS
network in December 2001 but choose not to disclose his access until
February 2002. LAMO utilized an exploit to gain access to SBC's
internal network. LAMO used a free internet connection at KINKO's to
perform the hack. LAMO gained access to usernames, passwords,
telephone numbers, addresses and other sensitive customer information.
In February 2002, LAMO discovered several misconfigured b6 -5
proxy servers acting as doorways between the public Internet and they jo -5
ivate intranet. LAMO contacted[__ of
to inform him that he had gained unauthorized access
into The NEW YORK TIMES intranet. LAMO utilized the proxy servers to
gain access to the NEW YORK TIMES network. Once on the network, LAMO
cracked a password for a userid with supervisor rights. Utilizing
this userid he was able to broaden his access as well as perform
certain functions within the network. LAMO created four (4)
Lexis/Nexus accounts off of the NEW YORK TIMES intranet and utilized
these accounts for himself and/or friends to run over 3,000 searches,
Of individuals, address and/or court documents
LAMO has committed other computer intrusions into several
other corporations such as AOL and EXCITE@HOME. Each time LAMO
commits a computer intrusion on a high profile organization he reports
the vunerability and intrusion to the media causing a distrust of the
company's clients. The above mentioned corporations have lost
significant money and trust of their clients.
FBI(19-cv-1495)-713
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Reader
Topic
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic