Five Prisoners hacked Prison Network

  • 0
Five Prisoners hacked prison network

Five Prisoners hacked Prison Network

Category : Blog

Five Prisoners hacked Prison Network

Official Inspector General of the State of Ohio reported a 50-page investigative report of the incident which now came in public domain, that took place back in 2015. It came to know that Five Prisoners hacked Prison Network.

According to the reports, five prisoners from the Marion Correctional Institution (MCI) secretly got hold on two computers, then they hid the computers under the suspended ceiling in the service room, after that they hacked the prison network, and got the opportunity to go into the unauthorised zone and involved themselves in illegal activities on the Internet. All of this became possible just because the prisoners were made to work under the Green Initiative program, in which they were engaged in the recycled different electronics.

Administrators of MCI began to notice something strange in the summer of 2015: an account belonging to one of the contractors of the prison began to exceed the daily quota of traffic. Then similar performance began to show the accounts of other employees, including on weekends, when these employees were absent in the workplace. A few days later, it become worse, these employees began to make attempts to evade the proxies that monitored the traffic.

Administrators’ intuition gave rise to a full-fledged investigation, during which strange activity could be traced to a computer that appears in the report as -lab9-. This name did not fit into the internal naming system at all.

Five Prisoners hacked prison network

Officials of MCI first began to identify in the summer of 2015, when an account of one of the contractors of the prison began to overreach the daily quota of traffic. Then other accounts of the employees started showing the same behaviour.

After all this, administrators’ started a full-fledged investigation, and during which they found out a computer name that did not match the internal naming system at all.

Further investigation, the team found out the suspicious traffic was from port 16 of the switchboard located in the prison, and they discovered out the device in the suspended ceiling. It was a great shock for the employees of MCI to find out two prisoners working on the computers behind the plywood planes of the ceiling illegally.

All the five prisoners were engaged in the recycling of electronics under the Green Initiative program, and they took all the necessary parts for assembling the PC.

Investigators found two detected hard disks: hacking tools, legitimate software, traces of illegal activity.

However, the prisoners were not only interested in “internet-surfing”, they hacked accounts, intercepted prison traffic, and compromised the prison network.

All five hackers were identified, and presently they are serving their sentence in various correctional facilities.

Most Popular Training Courses at Indian Cyber Security Solutions

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Tester Training

Ethical Hacking  training

Python Programming training

CEH V9  training

Diploma in Network Security Training

Secured Coding in Java

Certified Network Penetration Tester 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 


Leave a Reply

Show Buttons
Hide Buttons