Posted on Leave a comment

PRISONERS develop diy COMPUTERS as well as HACK prison NETWORK

The Web is everywhere. the latest anecdotal evidence of this is a story of prison inmates that develop their own computer as well as linked it to the internet. Back in 2015, prisoners at the Marion Correctional organization in Ohio developed two computers from discarded parts which they transported 1,100 feet with prison grounds (even passing a security checkpoint) before hiding them in the ceiling of a training room. The info has just been made public after the release of the Inspector General’s report (PDF). This report is interesting as well as worth your time to read.

This Ethernet router was found in a training space in the prison. Physical gain access to is whatever in computer security.
Prisoners handled to gain access to the Ohio department of Rehabilitation as well as Corrections network utilizing login credentials of a retired prison worker who is currently working as a contract employee. The inmates plotted to take the identity of one more inmate as well as data tax returns under their name. They likewise gained gain access to to interior records of other prisoners as well as checked out websites on exactly how to manufacture medications as well as diy weapons, before prison officers were able to discover the hidden computers. From the report:

The ODAS OIT analysis likewise exposed that malicious activity had been happening within the ODRC inmate network. ODAS OIT reported, “…inmates appeared to have been conducting attacks against the ODRC network utilizing proxy machines that were linked to the inmate as well as department networks.” Additionally, ODAS OIT reported, “It appears the Departmental Offender tracking System (DOTS) portal was attacked as well as inmate passes were created. Findings of bitcoin wallets, stripe accounts, bank accounts, as well as credit history card accounts point toward possible identity fraud, together with other possible cyber-crimes.”

The prisoners included understood what they were doing. From the interview with the inmate it seems the computers were set up as a remote desktop bridge between interior computers they were enabled to utilize as well as the wider internet. They would utilize a computer on the inmate network as well as utilize a remote desktop to gain access to the illicit computers. These were running Kali Linux as well as there’s a listing of “malicious tools” discovered on the machines. It’s pretty much what you’d expect to discover on a Kali set up however the most entertaining one listed in the report is “Hand-Crafted Software”.

This seems crazy, however prisoners have always been coming up with new concepts to get one over on the guards — like building diy tattoo guns, When you have a great deal of time on your hands as well as bit responsibility, crazy concepts don’t seem so crazy after all.

Leave a Reply

Your email address will not be published. Required fields are marked *