February 23, 2026 Source: SecurityWeek 3 min read · 597 words

Romanian Hacker Pleads Guilty to Selling Access to US State Network

Румунський хакер визнав провину у продажу доступу до мережі штату США

A Romanian hacker just walked into a US courtroom and admitted to breaking into an Oregon state government network, then turning around and selling access to it like it was a used car on Craigslist. Catalin Dragomir's guilty plea represents exactly the kind of cybersecurity threat that keeps state IT directors up at night—not some elaborate nation-state operation, but a straightforward criminal transaction.

The Breach

According to SecurityWeek, Dragomir pleaded guilty to unauthorized access charges after compromising a network belonging to an Oregon state government office. That's the straightforward version. The more unsettling part? He didn't keep the access for himself.

Instead, he sold it.

Think about that for a second. Once you're inside a government network, you've got . You've got data. You've got the ability to cause real problems for real people who depend on state services. And rather than exploit it himself, Dragomir monetized it. He turned stolen credentials and network access into a product.

This is particularly nasty because it means someone else potentially had their own window into Oregon's systems. The real question is: how many other people bought access before law enforcement caught on?

Under the Hood

SecurityWeek didn't provide a granular technical breakdown—and frankly, that's probably intentional while the investigation remains active. But the general playbook here is familiar to anyone tracking cybersecurity incidents. Initial compromise, likely phishing or credential reuse. Lateral movement through the network. Establishing persistence so he could access the systems later. Then commodifying that access.

And here's what makes this vector dangerous: it doesn't require zero-days or advanced malware.

This was old-school intrusion economics. Dragomir found a way in, validated it worked, then sold it to whoever had money. No sophisticated tooling necessary. Just patience, reconnaissance, and a buyer on the other end of a dark web marketplace.

The Fallout

A guilty plea means Dragomir isn't mounting a defense. He's accepting responsibility and facing federal charges—which carries real prison time for unauthorized computer access and wire fraud. The sentencing hasn't been announced yet, but these cases typically land between 2 to 10 years depending on aggravating factors.

For Oregon state government? The damage assessment is ongoing.

There's the immediate technical work: audit logs, forensics, understanding the scope of what was accessed and for how long. Then comes the notification process, the incident reports, the mandatory disclosures if personal data got exposed. And the institutional damage—the reputational hit, the erosion of public trust in government services, the budget implications of beefing up security infrastructure that should've been there already.

Someone failed here. Someone missed this intrusion, or didn't patch something, or didn't monitor network traffic closely enough. That's the institutional reckoning nobody talks about.

Protecting Yourself

If you work in state or local government IT, treat this as . Dragomir didn't need to be sophisticated to do damage. He needed opportunity.

Start here: audit your external-facing systems. What's exposed that doesn't need to be? VPN endpoints, RDP servers, webmail interfaces—these are targets. Require multi-factor authentication everywhere. Not the soft stuff. Real MFA.

Second, assume compromise. Not if it happens, but when. That means logging everything, maintaining backups that aren't connected to production networks, and having a detection pipeline that actually works. Most breaches sit undetected for months. Change that.

Third, credential hygiene. Dragomir sold access—which means he had working credentials. Regular password rotations, privileged access management, blocking lateral movement with network segmentation. Make it expensive for an attacker to move sideways through your infrastructure.

And frankly? If you're a state agency that hasn't updated your cybersecurity posture in the last two years, you're running out of time.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →