• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Former St. Louis Cardinals Exec Sentenced To 46 Months For Hacking Houston Astros

September 5, 2016 by Brent Easley 4 Comments

I have strong interest in this story because, one you probably never heard of this happening with an employee from a sport franchise, and two, I am a baseball fan.  This article is about an employee of the St. Louis Cardinals hacking the internal network of the Houston Astros.  Chris Correa, who was a former scout for the St Louis Cardinals was sentenced to almost four years for hacking into the Houston Astros player database. Correa was able to hack the internal network of the Houston Astros and gain access to statistics, and projections that were gathered by the front office of the Astros. Corrrea was able to do this by getting the old password from a former employee who is now the general manager for the Houston Astros.  The federal government estimated that this information was worth 1.7 million dollars.  In my opinion, cases like this is why companies enforce complex passwords, changing passwords often, and telling clients not to give their password out to anyone.

https://consumerist.com/2016/07/19/former-st-louis-cardinals-exec-sentenced-to-46-months-for-hacking-houston-astros/

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    September 5, 2016 at 5:50 pm

    Very interesting article. I know a lot of sports team these days are investing heavily into data and analytics. The Phillies for example hired an ex-Google employee to run their baseball statistics program and invested over a million dollars in a data analytics system. Now that more teams are moving towards evaluating potential players using information systems, instead of the classical way of scouting them, I wonder if they will start taking cyber security seriously.

    Log in to Reply
  2. Shain R. Amzovski says

    September 5, 2016 at 8:56 pm

    Brent,
    This is an interesting article. Contrary to what many believe, hacking does not require a ton of technical knowledge, or sophisticated hacking techniques to gain control of a system. Employees should seek permission to wipe their personal laptops prior to leaving a company. Also, it is never a good idea to reuse passwords. I agree, if they would have had a password policy and a dual-factor authentication control in place, it may have reduced the likelihood that Correa would have been able to breach the Astros’ Ground Control system. Also, many professional sports teams are not resorting to Big Data Analytics to assist with scouting, and identifying trends in what makes players successful. SAP has done several implementations of its HANA software in professional organizations to assist teams with analyzing data.

    Log in to Reply
    • Shain R. Amzovski says

      September 5, 2016 at 8:58 pm

      Also, many professional sports teams are NOW resorting to Big Data Analytics to assist with scouting* I noticed a typo after I posted.

      Log in to Reply
  3. Wade Mackey says

    September 6, 2016 at 12:01 am

    From what I’ve heard, the Astro’s security processes were ineffective. They reset the password, but did not count on the fact that the attacker had access to victims email, so he got the new password. We don’t cover much about incident response in this course, but one take away is to keep digging once you see a compromise. It is pretty rare that only one thing is compromised.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in