Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Behind Bars: The Hospital Guard Hacker Who Posted His Crime on YouTube

Hacker Posted Video of Himself Compromising a Hospital’s Computer System on YouTube

Jesse William McGraw, a former contract security guard at the North Central Medical Plaza in Dallas, who admitted hacking into the hospital’s computer systems, was recently sentenced to 110 months in Federal prison.

Hacker Posted Video of Himself Compromising a Hospital’s Computer System on YouTube

Jesse William McGraw, a former contract security guard at the North Central Medical Plaza in Dallas, who admitted hacking into the hospital’s computer systems, was recently sentenced to 110 months in Federal prison.

Hospital HackerDuring his night shift, McGraw, a.k.a “Ghost Exodus,” 26, of Arlington, Texas, gained physical access to more than 14 computers, including a nurses’ station computer on the fifth floor and a heating, ventilation and air conditioning (HVAC) computer located in a locked room.

McGraw enabled remote access to the computers, and impaired the integrity of some of the systems by removing security features, thus leaving them wide open to attack. He also installed bots on several of the computers.

As the self-proclaimed leader of a hacking organization called the “Electronik Tribulation Army” (ETA), McGraw knew the severity of his actions. He even promoted hacking via homemade tutorials posted online for ETA members and other like-minded criminals.

See Also: Researchers Hack Internet Enabled TVs

Why did he do it? McGraw admits that he intended to use the bots and the compromised computers to launch DDoS attacks on the websites of rival hacker groups. Among the rivals is “Anonymous,” the hacker group currently claiming responsibility for attacks against PayPal and others in support of Wikileaks.

McGraw broke into the room containing the HVAC computer. He downloaded a password recovery tool from a website, inserted a removable storage device and then executed a program which allowed him to emulate a CD/DVD device. With remote access to the HVAC computer established, he then hacked a nurses’ station computer. McGraw made a video and audio recording of what he called his “botnet infiltration.” While the theme of “Mission Impossible” played, McGraw described his hack, step by step, including the insertion of a CD containing the OphCrack program, which allowed him to bypass all security. The FBI found the CD containing the OphCrack program in McGraw’s house and found the source code for the bot on his laptop.

While hacking into the HVAC computer, McGraw knew the risk of affecting the facility’s temperature, and the treatment and recovery of vulnerable patients. In addition, he could have affected the efficacy of all temperature-sensitive drugs and supplies. Although he denies, it, access to the nurses’ station computer could have opened the door to patient records.

Advertisement. Scroll to continue reading.

Read More in SecurityWeek’s Cybercrime Section

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...