Threat Intelligence

6/16/2017
03:02 PM
100%
0%

Engineer Sentenced to Prison for Hacking Utility, Disabling Water Meter-Readers

A Pennsylvania man is sentenced to more than a year in prison after hacking into a remote water meter reading system run by his former employer.

A federal court sentenced a Pennsylvania man to a year and a day in prison for hacking into his former employer's computer system and disabling the remote water meter readers that the company manufactured, according to the US Department of Justice.

Adam Flanagan, 42, plead guilty to two counts of unauthorized access to a protected computer and causing reckless damage. The radio frequency engineer hacked into his former employer's computer system after he was fired and disabled the water meter readers.

As a result, his former employer spent a large amount of time working with forensic examiners to determine what happened and how to resolve the problem. It also required local water district municipalities to dispatch employees out to read the meters, since the billing information was inaccurate after Flanagan disabled the remote meter readers.

A federal court judge opted to apply an enhanced sentencing guideline, which is allowed when a crime involves critical infrastructure, such as a city's water system.

Read more about the case here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.