DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Carrell Clinic guard indicted

Posted on July 28, 2009 by Dissent

A federal grand jury in Dallas has returned an indictment charging an Arlington, Texas, man, who worked as a contract security guard at the Carrell Clinic on North Central Expressway in Dallas, with felony offenses related to his compromising and damaging the hospital’s computer system, announced Acting U.S. Attorney James T. Jacks of the Northern District of Texas. Jesse William McGraw, a/k/a “Ghost Exodus,” 25, is charged with two counts of transmitting a malicious code. McGraw has been in custody since his arrest late last month on related charges outlined in a criminal complaint.

The indictment alleges that from April 2009 through June 2009, McGraw transmitted malicious code that caused damage to a computer at the Carrell Clinic that maintained patient medical records, giving him the potential to modify and impair medical exams, diagnoses, treatments or care of individuals. The indictment further alleges that during the same time frame, McGraw transmitted malicious code that caused damage to the HVAC computer that controlled the heating, ventilation and air conditioning at Carrell Clinic, giving him the potential to modify the building’s HVAC system, resulting in the impairment of patient medical exams, diagnoses, or the care of one or more individuals, and threatened public health and safety. Upon McGraw’s arrest, the Carrell Clinic Information Technology staff identified and remedied the numerous compromised computers in the building.

According to the affidavit filed in support of the criminal complaint, McGraw is the leader of the hacker group, “Electronik Tribulation Army.” He was employed as a security guard for United Protection Services, in Dallas, and worked the night shift, from 11:00 p.m. to 7:00 a.m. at the Carrell Clinic hospital. McGraw, who used the online nickname “Ghost Exodus,” posted pictures on the Internet of the compromised HVAC system and videos of himself compromising a computer system in a hospital.

The affidavit further stated that the investigation revealed that McGraw was planning to use his compromised systems to commit additional crimes on or before July 4, 2009, a date that McGraw, according to the affidavit, called “Devil’s Day.” He posted videos on the Internet which included admonitions to other hackers to assist him in conducting unauthorized computer intrusions in support of a “massive DDOS” on July 4, 2009. DDOS is an acronym for Distributed Denial of Service, a type of computer attack in which an unauthorized individual assumes control of other computers and uses the massed ability of those computers, over which they have unauthorized access and control, to attack targeted computers. The investigation also revealed that McGraw recently provided United Protection Services his one week notice and his last day of work was to be July 3, 2009, the day before the scheduled DDOS attack.

An indictment is an accusation by a federal grand jury and a defendant is entitled to the presumption of innocence unless proven guilty. However, if convicted, each count carries a maximum statutory sentence of 10 years in prison, a $250,000 fine and restitution.

Source: U.S. Attorney’s Office, Northern District of Texas


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
Category: Breach IncidentsHackHealth DataMalwareU.S.

Post navigation

← Two indicted in aggravated id theft
Second member of id theft ring pleads guilty →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.