Xbox Underground

Last updated

Xbox Underground was an international hacker group responsible for gaining unauthorized access to the computer network of Microsoft and its development partners, including Activision, Epic Games, and Valve, in order to obtain sensitive information relating to Xbox One and Xbox Live.

Contents

Microsoft

Microsoft's computer network was compromised repeatedly by the Xbox Underground between 2011 and 2013. According to a 65-page indictment, the hackers spent "hundreds of hours" searching through Microsoft's network copying log-in credentials, source code, technical specifications and other data. This culminated in the perpetrators carrying out a physical theft, by using stolen credentials to enter "a secure building" at Microsoft's Redmond headquarters and exiting with publicly unreleased prototypes of the Xbox One codenamed "Durango". Group members say they were driven by a strong curiosity about Microsoft's then-unreleased Xbox One console and associated software. [1] [2]

Beginning in or about January 2011, Microsoft was the victim of incidents of unauthorized access to its computer networks, including GDNP's protected computer network, which resulted in the theft of log-in credentials, trade secrets and intellectual property relating to its Xbox gaming system. p. 4

In or about September 2013, Alcala and Pokora brokered a physical theft, committed by A.S. and E.A., of multiple Xbox Development Kits (XDKs) from a secure building on Microsoft's Redmond, Washington campus. Using stolen access credentials to a Microsoft building, A.S. and E.A. entered the building and stole three non-public versions of the Xbox One console... p. 31

Apache helicopter simulator software

The group is also accused of breaching the computer network of Zombie Studios, through which they obtained Apache helicopter simulator software developed for the United States military. [3] David Pokora was quoted as saying: "Have you been listening to the [expletive] that I've done this past month? I have [expletive] to the U.S. military. I have [expletive] to the Australian Department of Defense ... I have every single big company – Intel, AMD, Nvidia – any game company you could name, Google, Microsoft, Disney, Warner Bros., everything." [4]

Members

Four members of the group have pleaded guilty to charges. [5] David Pokora, the first foreign hacker ever to be sentenced on United States soil, received an 18-month prison term on April 23, 2014, and was released in July 2015. [6] [7] Nathan LeRoux and Sanad Odeh Nesheiwat were sentenced on June 11 and received 24 months and 18 months respectively; Austin Alcala was due for sentencing in July, [8] though, he went on to cooperate with the FBI in resolving another criminal case involving the illegal trade of FIFA coins. [9] [10]

Dylan Wheeler (referred to in the indictment as D.W), currently out of reach of the United States, lived in Australia at the time and was charged with a varying degree of charges. He was not convicted, having fled from Australia to Dubai and eventually the Czech Republic over human rights and political issues with his trial [11] [12] from where he cannot be extradited since he holds Czech citizenship, [13] and is currently living in the UK. [14] His mother, Anna Wheeler, was later jailed for more than two years for helping him flee Australia to avoid criminal charges. [15] [16]

Wheeler alleges that a sixth member, Justin May (referred to as "Person A"), worked with the FBI "to bring down the group". [17] May had previously been placed on pre-trial probation for an earlier offense involving data theft, the agreement of which required him to stay off Xbox Live. [18] He came under renewed interest from the FBI in 2017 after they seized a new BMW coupe and $38,595 in cash that was hidden throughout his home. [10] In June 2021, May was sentenced to seven years in prison for defrauding over 3.5 million dollars from several tech companies, among them Microsoft and Cisco Systems, by exploiting warranty policies to illegitimately receive replacements which were then sold online. [19]

Related Research Articles

The Melissa virus is a mass-mailing macro virus released on or around March 26, 1999. It targets Microsoft Word and Outlook-based systems and created considerable network traffic. The virus infects computers via email; the email is titled "Important Message From," followed by the current username. Upon clicking the message, the body reads, "Here's that document you asked for. Don't show anyone else ;)." Attached is a Word document titled "list.doc," containing a list of pornographic sites and accompanying logins for each. It then mass-mails itself to the first fifty people in the user's contact list and disables multiple safeguard features on Microsoft Word and Microsoft Outlook.

Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA), which criminalizes computer-related acts under federal jurisdiction and directly combats the insufficiencies of existing laws. Types of computer fraud include:

The Federation Against Copyright Theft (FACT) is an organisation established in 1983 to protect and represent the interests of its members' intellectual property (IP). FACT also investigates fraud and cybercrime, and provides global due diligence services to support citizenship investment and trade, business, financial and legal compliance.

Operation: Bot Roast is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners' knowledge, which turns the computer into a zombie computer that then sends out spam to other computers from the compromised computer, making a botnet or network of bot infected computers. The operation was launched because the vast scale of botnet resources poses a threat to national security.

DarkMarket was an English-speaking internet cybercrime forum created by Renukanth Subramaniam in London that was shut down in 2008 after FBI agent J. Keith Mularski infiltrated it using the alias Master Splyntr, leading to more than 60 arrests worldwide. Subramaniam, who used the alias JiLsi, admitted conspiracy to defraud and was sentenced to nearly five years in prison in February 2010.

Cameron LaCroix, aka camo, cam0, camZero, cmuNNY, is an American computer hacker best known for the hacking of Paris Hilton's cellular phone, accessing LexisNexis, and defacing Burger King's Twitter account. He has also been convicted of intentionally causing damage to a protected computer system, obtaining information from a protected computer system, wire fraud, and aggravated identity fraud. Prosecutors said victims of the teen's actions have suffered about $1 million in damages. Pursuant to a plea agreement signed by the juvenile in August 2005, he received 11 months in a federal juvenile detention facility. In January 2007 his supervised release was revoked due to possession of a cell phone.

<span class="mw-page-title-main">Computer Crime and Intellectual Property Section</span> United States federal law enforcement agency

The Computer Crime and Intellectual Property Section (CCIPS) is a section of the Criminal Division of the U.S. Department of Justice in charge of investigating computer crime and intellectual property crime. They are additionally responsible for prosecuting privacy invasions by criminals such as hackers, cyberstalkers, and purveyors of mobile spyware, and specializing in the search and seizure of digital evidence in computers and on networks.

Max Ray Vision is a former computer security consultant and hacker who served a 13-year prison sentence, the longest sentence ever given at the time for hacking charges in the United States. He was convicted of two counts of wire fraud, including stealing nearly 2 million credit card numbers and running up about $86 million in fraudulent charges.

<span class="mw-page-title-main">Sarah Palin email hack</span> Email hack

The Sarah Palin email hack occurred on September 16, 2008, during the 2008 United States presidential election campaign when vice presidential candidate Sarah Palin's personal Yahoo! email account was subjected to unauthorized access. The hacker, David Kernell, obtained access to Palin's account by looking up biographical details, such as her high school and birthdate, and using Yahoo!'s account recovery for forgotten passwords. Kernell then posted several pages of Palin's email on 4chan's /b/ board. Kernell, who at the time of the offense was a 20-year-old college student, was the son of longtime Democratic state representative Mike Kernell of Memphis.

<span class="mw-page-title-main">Silk Road (marketplace)</span> 2011–2014 darknet market known for the sale of illegal drugs

Silk Road was an online black market and the first modern darknet market. It was launched in 2011 by its American founder Ross Ulbricht under the pseudonym "Dread Pirate Roberts". He managed the entire marketplace from his personal laptop, which was seized by the FBI on 1 October 2013. As part of the dark web, Silk Road operated as a hidden service on the Tor network, allowing users to buy and sell products and services between each other anonymously. All transactions were conducted with bitcoin, a cryptocurrency which aided in protecting user identities. The website was known for its illegal drug marketplace, among other illegal and legal product listings. Between February 2011 and July 2013, the site facilitated sales amounting to 9,519,664 Bitcoins.

<i>United States v. Ivanov</i>

United States v. Ivanov was an American court case addressing subject-matter jurisdiction for computer crimes performed by Internet users outside of the United States against American businesses and infrastructure. In trial court, Aleksey Vladimirovich Ivanov of Chelyabinsk, Russia was indicted for conspiracy, computer fraud, extortion, and possession of illegal access devices; all crimes committed against the Online Information Bureau (OIB) whose business and infrastructure were based in Vernon, Connecticut.

Hunter Edward Moore is an American convicted criminal from Sacramento, California. Rolling Stone called him "the most hated man on the Internet." In 2010, he created the revenge porn website Is Anyone Up? which allowed users to post sexually explicit photos of people online without their consent, often accompanied by personal information such as their names and addresses. He refused to take down pictures on request. Moore called himself "a professional life ruiner" and compared himself to Charles Manson. The website was up for 16 months, during which Moore stated several times he was protected by the same laws that protect Facebook. Moore also paid a hacker to break into email accounts of victims and steal private photos to post.

Gone in 60 Seconds was a fraud scheme uncovered in 2012 involving the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern California and Nevada.

<span class="mw-page-title-main">Freedom Hosting</span> Defunct Tor specialist web hosting service

Freedom Hosting is a defunct Tor specialist web hosting service that was established in 2008. At its height in August 2013, it was the largest Tor web host.

DeepDotWeb was a news site dedicated to events in and surrounding the dark web featuring interviews and reviews about darknet markets, Tor hidden services, privacy, bitcoin, and related news. The website was seized on May 7, 2019, during an investigation into the owners' affiliate marketing model, in which they received money for posting links to certain darknet markets, and for which they were charged with conspiracy to commit money laundering. In March 2021 site administrator Tal Prihar pleaded guilty to his charge of conspiracy to commit money laundering.

Playpen was a notorious darknet child pornography website that operated from August 2014 to March 2015. The website operated through the Tor network which allowed users to use the website anonymously. After running the website for 6 months, the website owner Steven W. Chase was captured by the FBI. After his capture, the FBI continued to run the website for another 13 days as part of Operation Pacifier.

Cyber spying on universities is the practice of obtaining secrets and information without the permission and knowledge of the university through its information technology system. Universities in the United Kingdom, including Oxford and Cambridge, have been targets, as have institutions in the US and Australia.

An untitled Grand Theft Auto game is in development by Rockstar Games. It is due to be the eighth main Grand Theft Auto game, following Grand Theft Auto V (2013), and the sixteenth instalment overall. Following years of speculation and leaks, Rockstar confirmed in February 2022 that the game is in development, and footage from unfinished versions was leaked online the following September in what was described as one of the biggest leaks in the history of the video game industry.

References

  1. Stephen Totilo. Hackers Charged With Stealing From Valve, Microsoft And More, Kotaku, September 30, 2014.
  2. United States of America vs. Leroux, Nesheiwat, Pokora & Alcala, Smoking Gun
  3. Michael Adams. Teen charged in $100M international scheme to hack Army, tech companies, Army Times, October 3, 2014.
  4. O'Sullivan, Sean (2 October 2014). "Two plead guilty in international hacker case". delawareonline.com. The News Journal.
  5. U.S. Department of Justice. Fourth member of hacking ring pleads guilty to hacking and intellectual property theft, justice.gov, April 01, 2015.
  6. Jessica Reyes. Foreign hacker sentenced for first time ever in US, The News Journal, April 23, 2015.
  7. Leech Tishman. Canadian hacker sentenced for intellectual property theft, lexology.com, May 23, 2015.
  8. Kristine Guerra. Indiana hacker faces sentencing in $100 million scheme, indystar.com, May 22, 2015.
  9. Jason Schreier. FBI Says Alleged Hackers Used FIFA To Steal Millions From EA, Kotaku, November 14, 2016.
  10. 1 2 KarlBaker. Delaware man with history of cyber theft under FBI scrutiny, The News Journal, June 25, 2017.
  11. Stephen Totilo. The Incredible Rise and Fall of a Hacker Who Found the Secrets of the Next Xbox and PlayStation—And Maybe More, Kotaku, February 22, 2013.
  12. Luke Hopewell. The Aussie Kid Who Allegedly Hacked The Gaming Industry Wants To Give Up His Citizenship Over 'Police State' Laws, Gizmodo, July 10, 2015.
  13. "XBox Underground (Part 2) – Darknet Diaries". darknetdiaries.com. Retrieved 2022-01-05.
  14. "XBox Underground (Part 2) – Darknet Diaries". darknetdiaries.com. Retrieved 2022-01-05.
  15. Tim Clark. Mum collapses after being jailed for helping son avoid Xbox hacking charges, The West Australian, 23 February 2017.
  16. "The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far". WIRED. Retrieved 2018-10-15.
  17. Tim Alamenciak. Broken bumper helped break international hacking case, The Star, October 3, 2014.
  18. Brian Crecente. Court Bans Accused PAX Code Thief From Xbox Live, Takes His PC, Kotaku, October 27, 2010.
  19. "Delaware Man Sentenced to Over Seven Years for Defrauding Cisco Systems, Microsoft, Lenovo, and APC Out of More than $3.5 million in Computer Hardware". www.justice.gov. 2021-06-03. Retrieved 2021-07-21.