Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Former US Govt Employee ‘Tried to Sell Nuclear Secrets’

A former Department of Energy employee has been indicted after attempting to hack agency computers to steal and then sell nuclear secrets to Iran, China and Venezuela, US officials said Friday.

A former Department of Energy employee has been indicted after attempting to hack agency computers to steal and then sell nuclear secrets to Iran, China and Venezuela, US officials said Friday.

Charles Harvey Eccleston, 62, who also worked at the Nuclear Regulatory Commission, was snared in an FBI sting operation that was launched after he entered a foreign embassy and offered to hand over classified information, according to the affidavit.

Eccleston proposed to undercover FBI agents posing as representatives of the unnamed country to design and send Energy Department employees “spear-phishing” emails that contained malware that could be used to extract classified nuclear information.

Eccleston, who faces up to 50 years in prison over the four charges, offered to provide that sensitive information in return for payment.

He was detained by Philippine authorities in Manila on March 27, 2015 and deported to the US.

“As alleged in the indictment, Eccleston sought to compromise, exploit and damage US government computer systems that contained sensitive nuclear weapon-related information with the intent to allow foreign nations to gain access to that material,” said Assistant Attorney General John Carlin.

“When asked what he would do if Country A was not interested in obtaining the US government information Eccleston was offering, Eccleston stated he would go to China, Iran or Venezuela, as he believed these countries would be interested in the information,” according to FBI documents seen by AFP.

Eccleston, a US citizen who had been living in Davao City in the Philippines since 2011, was sacked from his job in 2010 “due to performance and conduct issues.”

Advertisement. Scroll to continue reading.
Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.