Audio By Carbonatix
It was almost one year ago the feds introduced us to 25-year-old Jesse William McGraw — otherwise known as “GhostExodus,” founder and the, uh, leader of the Electronik Tribulation Army. You remember McGraw: He’s the former night-shift security guard at the W.B. Carrell Memorial Clinic on N. Central Expressway who hacked into 14 computers — including those containing patient info and those operating the HVAC — and intended to shut it down, shut it all down. He even posted his exploits to YouTube and finally came to the attention of an Interwebs security expert who ultimately helped bust him.
Arrested in June based upon this affidavit, he was indicted by a federal grand jury in July, ’round about the same time his missus said, look, he’s done got issues.
He’ll now have plenty of time to work ’em out: The U.S. Attorney’s Office just sent word that McGraw has pleaded guilty to an indictment charging two counts of transmitting a malicious code. According to the feds, ” McGraw admitted that he intended to use the bot to launch a denial of service attack on the website of a rival ‘hacker’ group.” Each count carries a max statutory sentence of 10 years in prison and a $250,000 fine. He’ll be sentenced in Dallas federal court on September 16. Which gives you plenty of time to read the compelling narrative that follows.
ARLINGTON SECURITY GUARD, WHO HACKED INTO HOSPITAL’S COMPUTER SYSTEM, PLEADS GUILTY TO FEDERAL CHARGES
Defendant Posted Video of Himself
Compromising a Hospital’s Computer System on YouTubeDALLAS – Jesse William McGraw, who worked as a contract security
guard at the North Central Medical Plaza on North Central Expressway in
Dallas, pleaded guilty today, before U.S. District Judge Jane J. Boyle,
to felony offenses related to his compromising and damaging the
hospital’s computer system, announced U.S. Attorney James T. Jacks of
the Northern District of Texas.McGraw, a/k/a “Ghost Exodus,” 25, of Arlington, Texas pleaded
guilty to an indictment charging two counts of transmitting a malicious
code. Each count carries a maximum statutory sentence of ten years in
prison and a $250,000 fine. McGraw, who has been in custody since his
arrest in June 2009 on related charges filed in a criminal complaint,
will be sentenced by Judge Boyle on September 16, 2010.The North Central Medical Plaza houses medical offices and
surgery centers, to include the W.B. Carrell Memorial Clinic and the
North Central Surgery Center. McGraw, a contract security guard for
United Protection Services, generally worked the night shift, from 11:00
p.m. to 7:00 a.m.McGraw gained physical access to more than 14 computers located
in the North Central Medical Plaza, including a nurses’ station computer
on the fifth floor and a heating, ventilation and air conditioning
(HVAC) computer located in a locked room. The nurses’ station computer
was used to track a patient’s progress through the Carrell Memorial
Clinic and medical staff also used it to reference patients’ personal
identifiers, billing records and medical history. The HVAC computer was
used to control the heating, ventilation and air conditioning for the
first and second floors used by the North Central Surgery Center.McGraw installed, or transmitted, a program to the computers
that he accessed that allowed him, or anyone with his account name and
password, to remotely access the computers. He also impaired the
integrity of some of the computer systems by removing security features,
e.g., uninstalling anti-virus programs, which made the computer systems
and related network more vulnerable to attack. He also installed
malicious code (sometimes called a “bot”) on some of the computers.
Bots are usually associated with theft of data from the compromised
computer, using the compromised computer in denial of service attacks,
and using the computer to send spam. In this case, McGraw admitted that
he intended to use the bot to launch a denial of service attack on the
website of a rival “hacker” group.McGraw knew his actions would damage the security and integrity
of these stems. He advocated taking these kinds of actions to adversely
affect the integrity of systems in instructions that he posted online
for members of his “Electronik Tribulation Army” (ETA) and other
individuals interesting in committing crimes against computers.On February 12, 2009, McGraw abused the trust placed in him and
bypassed the physical security to the locked room containing the HVAC
computer. At approximately 11:35 p.m., he began downloading a password
recovery tool from a website, which he used to re-recover passwords. By
February 13, 2009, at approximately 1:19 a.m., McGraw, again without
authorization, physically accessed the HVAC computer and inserted a
removable storage device and executed a program which allowed him to
emulate a CD/DVD device. He remotely accessed the HVAC computer five
times on April 13-14, 2009.On April 28, 2009, at about 1:45 a.m., McGraw abused the trust
placed in him as a security guard and accessed without authorization a
nurses’ station computer. McGraw made a video and audio recording of
what he called his “botnet infiltration.” While the theme of “Mission
Impossible” played, McGraw described step by step his conduct, accessing
without authorization an office and a computer, inserting a CD
containing the OphCrack program into the computer to bypass any
passwords or security, and inserting a removable storage device into the
computer which he claimed contained a malicious code or program. The
FBI found the CD containing the OphCrack program in McGraw’s house and
found the source code for the bot on his laptop.McGraw was aware that modifying the HVAC computer controls could
affect the facility’s temperature. By affecting the environmental
controls of the facility, he could have affected the treatment and
recovery of patients who were vulnerable to changes in the environment.
In addition, he could have affected treatment regimes, including the
efficacy of all temperature-sensitive drugs and supplies.He was also aware that the nurses’ station computer was used to
access and review medical records. While he claims that he did not
review or modify patient records, and the government is not aware of any
evidence to the contrary, by gaining administrator access to these
computers he would have had the ability to modify these records if he
had taken additional steps to circumvent additional security measures.The case is being investigated by the FBI and the Texas Attorney
General’s Criminal Investigation Division. Assistant U.S. Attorney C.
S. Heath is prosecuting the case.