US Military 'Hacked' by Emails

N&P: Discuss governments, nations, politics and recent related news here.

Moderators: Alyrium Denryle, Edi, K. A. Pital

Post Reply
User avatar
The Grim Squeaker
Emperor's Hand
Posts: 10319
Joined: 2005-06-01 01:44am
Location: A different time-space Continuum
Contact:

US Military 'Hacked' by Emails

Post by The Grim Squeaker »

Source wrote:"Two of the US Military's most important science labs were apparently 'hacked'.
Hackers have succeeded in breaking into the computer systems of two of the U.S.' most important science labs, the Oak Ridge National Laboratory (ORNL) in Tennessee and Los Alamos National Laboratory in New Mexico.


In what a spokesperson for the Oak Ridge facility described as a "sophisticated cyber attack," it appears that intruders accessed a database of visitors to the Tennessee lab between 1990 and 2004, which included their social security numbers and dates of birth. Three thousand researchers reportedly visit the lab each year, a who's who of the science establishment in the U.S.

The attack was described as being conducted through several waves of phishing emails with malicious attachments, starting on Oct. 29. Although not stated, these would presumably have launched Trojans if opened, designed to bypass security systems from within, which raises the likelihood that the attacks were targeted specifically at the lab.


ORNL director, Thom Mason, described the attacks in an email to staff earlier this week as being a "coordinated attempt to gain access to computer networks at numerous laboratories and other institutions across the country."

"Because of the sensitive nature of this event, the laboratory will be unable for some period to discuss further details until we better understand the full nature of this attack," he added.

The ORNL has set up a web page giving an official statement on the attacks, with advice to employees and visitors that they should inform credit agencies so as to minimize the possibility of identity theft.

Less is known about the attacks said to have been launched against the ORNL's sister-institution at Los Alamos, but the two are said to be linked. It has not been confirmed that the latter facility was penetrated successfully, though given that a Los Alamos spokesman said that staff had been notified of an attack on Nov. 9 - days after the earliest attack wave on the ORNL - the assumption has to be that something untoward happened there as well, and probably at other science labs across the U.S.

The ORNL is a multipurpose science lab, a site of technological expertise used in homeland security and military research, and also the site of one of the world's fastest supercomputers. Los Alamos operates a similar multi-disciplinary approach, but specializes in nuclear weapons research, one of only two such sites doing such top-secret work in the U.S.

Los Alamos has a checkered security history, having suffered a sequence of embarrassing breaches in recent years. In August of this year, it was revealed that the lab had released sensitive nuclear research data by email, while in 2006 a drug dealer was allegedly found with a USB stick containing data on nuclear weapons tests.

"This appears to be a new low, even drug dealers can get classified information out of Los Alamos," Danielle Brian, executive director of the Project On Government Oversight (POGO), said at the time. Two years earlier, the lab was accused of having lost hard disks

The possibility that the latest attacks were the work of fraudsters will be seen by some as optimistic - less positive would be the possibility of a rival government having been involved. Given the apparently coordinated nature of events, speculation will inevitably point to this scenario, with the data theft a cover motivation for more serious incursions.
What type of retarded "Separate network" security designs allow those separate networks (And highly sensitive ones at that) interact with another, insecure network (The Web)...
(For those who don't know, the US military runs on it's own seperate network infrastructure).
Photography
Genius is always allowed some leeway, once the hammer has been pried from its hands and the blood has been cleaned up.
To improve is to change; to be perfect is to change often.
User avatar
The Yosemite Bear
Mostly Harmless Nutcase (Requiescat in Pace)
Posts: 35211
Joined: 2002-07-21 02:38am
Location: Dave's Not Here Man

Post by The Yosemite Bear »

Which one wonders how they failed to learn from when Mitchkin's computer club did it in the early 80's....
Image

The scariest folk song lyrics are "My Boy Grew up to be just like me" from cats in the cradle by Harry Chapin
User avatar
Resinence
Jedi Knight
Posts: 847
Joined: 2006-05-06 08:00am
Location: Australia

Post by Resinence »

What type of retarded "Separate network" security designs allow those separate networks (And highly sensitive ones at that) interact with another, insecure network (The Web)...
(For those who don't know, the US military runs on it's own separate network infrastructure).
Depending on the payload (they didn't give details), it could spread to the internal network easily just by a stupid employee checking his email through the exchange server or whatever, if they even run the standard WAN/LAN separation at all. If the payload was written just for the attack and with knowledge of the internal network then it would even work with the separation, all it takes is for someone to copy an infected binary file, such as research images/data to a PC on the internal network. Just set it up to check if the machine it's on is running a database (access? mysql? etc) and copy the entire thing, then just have it sit dormant until an idiot in the sensitive areas "Updates firefox" or looks at porn at work, or even a careless admin doing online updates.

But they probably didn't have a whole lot of separation in the first place, I suspect their email server was also their database server (which is common) for convenience sake, and the payload was targeted at that configuration. Seems like more than just a random script kiddie, this has pro written all over it, I don't think its out of line to mention that it could be someone looking for sensitive data and all they could get was that list. The research data probably was separated from the net though, which is why they didn't report any actual classified information stolen (well hopefully it is, if they learnt from previous attacks).
“Most people are other people. Their thoughts are someone else's opinions, their lives a mimicry, their passions a quotation.” - Oscar Wilde.
User avatar
Rogue 9
Scrapping TIEs since 1997
Posts: 18687
Joined: 2003-11-12 01:10pm
Location: Classified
Contact:

Post by Rogue 9 »

Social engineering: Because there is no patch for human stupidity.

Seriously, who the fuck opens e-mails from unknown senders and then proceeds to download attachments from said e-mails when they have no idea about the contents? A lot of people, I know, but who the fuck does this at a national research lab?
It's Rogue, not Rouge!

HAB | KotL | VRWC/ELC/CDA | TRotR | The Anti-Confederate | Sluggite | Gamer | Blogger | Staff Reporter | Student | Musician
User avatar
The Yosemite Bear
Mostly Harmless Nutcase (Requiescat in Pace)
Posts: 35211
Joined: 2002-07-21 02:38am
Location: Dave's Not Here Man

Post by The Yosemite Bear »

As Kevin M. found out Security People. Usually it's the idiots assigned to guard the building from outsiders. I mean who else would accept that a high school student on the phone is a network IT?
Image

The scariest folk song lyrics are "My Boy Grew up to be just like me" from cats in the cradle by Harry Chapin
User avatar
Ace Pace
Hardware Lover
Posts: 8456
Joined: 2002-07-07 03:04am
Location: Wasting time instead of money
Contact:

Post by Ace Pace »

Most underwhelming thread ever.
US mil hacked....for visitors SS records.

The rest of the article describes prior fuckups which actually matter more.
Brotherhood of the Bear | HAB | Mess | SDnet archivist |
User avatar
Tsyroc
Emperor's Hand
Posts: 13748
Joined: 2002-07-29 08:35am
Location: Tucson, Arizona

Post by Tsyroc »

Some more info on the attack.
International Herlad Tribune wrote: China Tied to Cyberattack on U.S. Lab

International Herlad Tribune | December 11, 2007
A cyberattack reported last week by one of the U.S. government's nuclear weapons laboratories may have originated in China, according to a confidential memorandum distributed to public and private security officials by the Department of Homeland Security.

Security researchers said the memorandum, which was obtained by a reporter from an executive at a private company, included a list of Web and Internet addresses that were linked to locations in China.

But they noted that such links did not prove that the Chinese government or Chinese citizens were involved in the attacks. In the past, intruders have compromised computers in China and then used them to disguise their true location.

Officials at the lab, Oak Ridge National Laboratory in Tennessee, said the attacks did not compromise classified information, though they acknowledged that they were still working to understand the full extent of the intrusion.

The Department of Homeland Security distributed the confidential warning to computer security officials on Wednesday after what it described as a set of "sophisticated attempts" to compromise computers used by the private sector and the government.

Government computer security officials said the warning, which was issued by the United States Computer Emergency Response Team, known as US-Cert, was related to an attack in October that was also disclosed last week by officials at the Oak Ridge laboratory.

According to a letter to employees written by the laboratory's director, Thom Mason, an unknown group of attackers sent targeted e- mail messages to roughly 1,100 employees as part of the ruse.

"At this point, we have determined that the thieves made approximately 1,100 attempts to steal data with a very sophisticated strategy that involved sending staff a total of seven 'phishing' e- mails, all of which at first glance appeared legitimate," he wrote in an e-mail message sent to employees last Monday.

"At present we believe that about 11 staff opened the attachments, which enabled the hackers to infiltrate the system and remove data."

In a statement posted on the laboratory's Web site, the agency stated: "The original e-mail and first potential corruption occurred on October 29, 2007. We have reason to believe that data was stolen from a database used for visitors to the Laboratory."

The laboratory said the attackers were able to gain access to a database containing personal information about visitors to the laboratory going back to 1990.

The US-Cert advisory, which was not made public, stated: "The level of sophistication and the scope of these cybersecurity incidents indicate that they are coordinated and targeted at private sector systems."

The US-Cert memo referred to the use of e-mail messages that fool employees into clicking on documents that then permit attackers to plant programs in their computers.

These programs are then able to copy and forward specific data - like passwords - to remote locations.
I like that they aren't going "Oh my god China did it" just because it appears to have originated in China.
By the pricking of my thumb,
Something wicked this way comes.
Open, locks,
Whoever knocks.
User avatar
Chris OFarrell
Durandal's Bitch
Posts: 5724
Joined: 2002-08-02 07:57pm
Contact:

Post by Chris OFarrell »

Because the Chinese are THE ENEMY!

Seriously though, I'm sure these places have hardcore physical separation between their internal research computers, plus external internet connected computers, probably with strict rules on what you can do on both.

Of course, Users are wonderful people who often think said rules are just strong suggestions...
Image
Post Reply