Sunday, January 12

How to hack the Jacksonville Jaguars’ jumbotron (and wind up in prison for 220 years)

videobacks.net

Expand/ Three examples of tampering.

DOJ

Was somebody tinkering the ' huge jumbotron?

, 2018, the Jaguars were the when the in- screen experienced, in the ' , “ in referral sync which manifested as a big horizontal lines [sic] appearing throughout one entire video .”

On , throughout a versus the , it occurred once again– however this , whole video sub-boards filled with green.

On 2, 2018, the Colts came to town and the jumbotron glitched a 3rd time as “a video board experienced a of what appeared to be the of one of the showed.”

The Jaguars' IT might not at the time duplicate any of these video , and they started to presume that what they were seeing was not a technical issue however some sort of . Going into log , they rapidly discovered that the source of the December 2 issue was “a command to alter a particular specification” of the video .

Where had the command originated from? An Abekas Mira video control called MIRA9120. The Abekas Mira was to assist in the and screen of instantaneous replay video to be revealed in-stadium on the huge jumbotron, however this specific server had actually been either decommissioned or kept on hand as an extra. In any , the believed the server remained in . When they went looking, MIRA9120 turned out to be sitting in the server , up on a rack simply next to the Abekas Mira .

IT staffers began poking around in MIRA9120 and discovered the remote- TeamViewer, recommending that somebody had actually been managing MIRA9120 from elsewhere. Just restricted about the offender might be obtained, since the TeamViewer circumstances had handicapped.

On December 3, the Jaguars' IT personnel detached MIRA9120 from the other video control servers– however they it powered on and in . They turned TeamViewer's connection logging on. The was to establish a honeypot in the assailant returned.

Throughout the December 16 video versus , TeamViewer tape-recorded another connection into MIRA9120. The TeamViewer account number that accessed the was logged, and the was passed to the , which was now actively examining the circumstance. sent out a subpoena to TeamViewer, which in 2019 supplied the IP of the that had actually utilized the account in on that .

This IP address was managed by , so a subpoena to Comcast lastly showed up the info the Jaguars desired: MIRA9120 was accessed on December 16 from a in Augustine, – a home where Samuel Arthur Thompson was living.

The secret

The Jags understood Thompson. He had actually invested almost as a for the group,

» …
Learn more

videobacks.net