Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Former Nuclear Agency Worker Sentenced to Prison for Attempted Hack

A former employee of the U.S. Department of Energy (DoE) and the Nuclear Regulatory Commission (NRC) has been sentenced to 18 months in prison for trying to hack into DoE computers in an attempt to steal nuclear secrets.

A former employee of the U.S. Department of Energy (DoE) and the Nuclear Regulatory Commission (NRC) has been sentenced to 18 months in prison for trying to hack into DoE computers in an attempt to steal nuclear secrets.

Charles Harvey Eccleston, 62, pleaded guilty in early February to one count of attempted unauthorized access and intentional damage to a protected computer.

Eccleston worked at the NRC until 2010, when his employment was terminated reportedly due to performance and conduct issues, and moved to Davao City in the Philippines the next year.

The man came into the attention of U.S. authorities in 2013 after he entered a foreign embassy in Manila, the capital of the Philippines, and offered to sell a list of more than 5,000 email addresses belonging to officials, engineers and employees of a U.S. government energy agency. He claimed the accounts were “top secret” and asked for $18,800 for the information, which he was allegedly prepared to sell to countries such as Iran, China and Venezuela.

Later that year, Eccleston met with an undercover FBI agent and offered to sell 5,000 email addresses belonging to NRC employees for $23,000, saying that a foreign country could use the information to deliver a piece of malware to computers within the NRC. The malware could then be used to access sensitive information or disrupt NRC servers, Eccleston said, according to the U.S. Department of Justice.

The undercover agent purchased 1,200 email addresses from Eccleston for $5,000. An analysis of these email addresses showed that the information was publicly available.

During a follow-up meeting with another undercover agent in 2014, Eccleston claimed to have a list of 30,000 email addresses belonging to DoE employees. He offered to design and send spear-phishing emails that would deliver a piece of malware. Over the next several months, the man designed spear-phishing emails that advertised conferences related to nuclear energy and included links that could be set up to point to a piece of malware that would be downloaded on the victim’s machine.

Eccleston sent out the emails to roughly 80 DoE employees in January 2015, but the link that was supposed to point to a piece of malware was provided by the undercover FBI agent so it was harmless.

Advertisement. Scroll to continue reading.

The suspect was detained by Philippine authorities in March 2015 and deported to the United States, where he was indicted in May. The man was cuffed after a meeting with the undercover FBI employee, who promised him $80,000 for sending out the spear-phishing emails.

In addition to the prison sentence, Eccleston has also been ordered to forfeit $9,000, representing the total amount of money given to him by undercover agents during the investigation.

Related Reading: Nuclear Agency’s Cybersecurity Center Not Optimized

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Cybercrime

A look into recent cryptocurrency tracing and recovery operations by the FBI and UK’s Metropolitan Police