27 May 2014
FBI on Monsegur Sentencing
http://www.fbi.gov/newyork/press-releases/2014/leading-member-of-the-international-cyber-criminal-group-lulzsec-sentenced-in-manhattan-federal-court
Leading Member of the International Cyber Criminal Group LulzSec Sentenced
in Manhattan Federal Court
Monsegur Cooperated with Law Enforcement to Reveal Structure and Methods
of Numerous Criminal Cyber Groups and Enabled Authorities to Identify Key
Cyber Criminals, Make Arrests, and Prevent and Remediate Numerous Cyber Attacks
U.S. Attorneys Office May 27, 2014
Southern District of New York (212) 637-2600
Preet Bharara, the United States Attorney for the Southern District of New
York, announced that Hector Monsegur, a/k/a Sabu, formerly a
leading member of a group of sophisticated computer hackers known as LulzSec,
was sentenced today in Manhattan federal court to time served and one year
of supervised release for his participation in computer hacking activity
that victimized media outlets, government agencies and contractors, and private
corporations around the world by hacking into, disabling, and at times
exfiltrating data from the victims computer systems. Monsegur pled
guilty in August 2011 to computer hacking conspiracy, computer hacking, computer
hacking in furtherance of fraud, conspiracy to commit access device fraud,
conspiracy to commit bank fraud, and aggravated identity theft pursuant to
a cooperation agreement with the government. U.S. District Judge Loretta
A. Preska imposed todays sentence.
According to the criminal Information and related filings in Manhattan federal
court and statements made at Monsegurs guilty plea:
Hacks by Anonymous, Internet Feds, and LulzSec
Since at least 2008, Anonymous has been a loose confederation of computer
hackers and others. Monsegur and other members of Anonymous, including Jeremy
Hammond, took responsibility for a number of cyber attacks between December
2010 and June 2011, including distributed denial of service (DDoS) attacks
against the websites of Visa, MasterCard, and PayPa, as retaliation for the
refusal of these companies to process donations to Wikileaks, as well as
hacks or DDoS attacks on foreign government computer systems.
Between December 2010 and May 2011, members of the Internet Feds computer
hacking collective similarly waged a deliberate campaign of online destruction,
intimidation, and criminality. Members of Internet Feds engaged in a series
of cyber attacks that included breaking into computer systems, stealing
confidential information, publicly disclosing stolen confidential information,
hijacking victims e-mail and Twitter accounts, and defacing victims
Internet websites. Specifically, Monsegur and other members of Internet Feds,
including Ryan Ackroyd, a/k/a kayla, a/k/a lol, a/k/a
lolspoon, Jake Davis, a/k/a topiary, a/k/a
atopiary, Darren Martyn, a/k/a pwnsauce, a/k/a
raepsauce, a/k/a networkkitten, and Donncha
OCearrbhail, a/k/a palladium, conspired to commit computer
hacks including the hack of the website of Fine Gael, a political party in
Ireland; the hack of computer systems used by security firms HBGary Inc.,
and its affiliate HBGary Federal LLC, from which Internet Feds stole confidential
data pertaining to 80,000 user accounts; and the hack of computer systems
used by Fox Broadcasting Company, from which Internet Feds stole confidential
data relating to more than 70,000 potential contestants on
X-Factor, a Fox television show.
In May 2011, following the publicity that they had generated as a result
of their hacks, including those of Fine Gael and HBGary, Monsegur, along
with Ackroyd, Davis, and Martyn, formed and became the principal members
of a new hacking group called Lulz Security or LulzSec. Like Internet Feds,
LulzSec undertook a campaign of malicious cyber assaults on the websites
and computer systems of business and governmental entities in the United
States and throughout the world. Specifically, Monsegur and his co-conspirators,
as members of LulzSec, conspired to commit computer hacks including the hacks
of computer systems used by the Public Broadcasting System, in retaliation
for what LulzSec perceived to be unfavorable news coverage in an episode
of the news program Frontline; Sony Pictures Entertainment (Sony),
in which LulzSec stole confidential data concerning approximately 100,000
users of Sonys website; and Bethesda Softworks (Bethesda), a video
game company based in Maryland, in which LulzSec stole confidential information
for approximately 200,000 users of Bethesdas website.
Among other things, at law enforcement direction, Monsegur engaged in proactive
cooperation that enabled the government to identify, locate, and arrest eight
of his co-conspirators, including Hammond. In addition, as a direct result
of Monsegurs cooperation, the government was able to prevent or mitigate
over 300 cyberattacks that were being planned or carried out by others, including
on the computer servers of U.S. and foreign governments, international
intergovernmental organizations, and private corporations. Monsegur also
provided information on vulnerabilities in certain critical infrastructure,
including at a U.S. water utility, that enabled law enforcement to secure
that infrastructure.
In pronouncing the sentence, Judge Preska said Monsegurs cooperation
was truly extraordinary. She also said, The fact that Monsegur
immediately chose to cooperate and went back online...allowed the extraordinary
cooperation.
In addition, at todays proceeding, Judge Preska ordered Monsegur, 30,
of New York, New York, to pay a $1,200 special assessment fee. Monsegur
previously served seven months in prison in connection with the crimes to
which he pled guilty.
Mr. Bharara praised the investigative work of the Federal Bureau of
Investigation.
The investigation was initiated and led by the FBI and its New York Cyber
Crime Task Force, which is a federal, state, and local law enforcement task
force combating cyber crime, with assistance from the PCeU, a unit of New
Scotland Yards Specialist Crime Directorate, SCD6; the Garda; and the
U.S. Attorneys Offices for the Eastern District of California, the
Central District of California, the Northern District of Georgia, and the
Eastern District of Virginia; and the Department of Justice Criminal
Divisions Office of International Affairs and its Computer Crime and
Intellectual Property Section.
The case is being handled by the Offices Complex Frauds and Cybercrime
Unit. Assistant U.S. Attorney James Pastore is in charge of the prosecution.
|