Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Media The Military United States

Worm Attack Prompts DoD To Ban Use of External Media 295

An anonymous reader writes "The Pentagon has suffered from a cyber attack so alarming that it has taken the unprecedented step of banning the use of external hardware devices, such as flash drives and DVDs [...] The attack came in the form of a global virus or worm that is spreading rapidly throughout a number of military networks."
This discussion has been archived. No new comments can be posted.

Worm Attack Prompts DoD To Ban Use of External Media

Comments Filter:
  • RIAA..... (Score:1, Interesting)

    by Anonymous Coward on Friday November 21, 2008 @04:26PM (#25850175)

    Sounds like a tactic the RIAA would use.. Find a way to penetrate, and make portable drives look evil. Everyone knows external drives = piracy, so what better way than to get it banned by the Pentagon. Slowly it will be illegal to even make them!

    Ohh RIAA, when will you be crushed? What next, banning torrenting at the Pentagon? Sheesh!

  • by Anonymous Coward on Friday November 21, 2008 @04:34PM (#25850293)
    Some networks fill USB ports with epoxy to disable them. Since valid devices (mouse, keyboard) are moving to USB connections, some sites are moving to software based solutions that only allow certain device types (mouse, keyboard) while denying others (mass storage, camera, etc...).

    As someone who has administered a classified demonstration network for my company, the policy for our lab was that anything attached to the network was approved by the security officer and connected by the approved system administrators. Any removable media with unclassified media was scanned on a dedicated system before being used on the classified system, and even then, only the system administrator was authorized to load the media. Unclassified removable media is not permitted within the secured facility (so leave your iPods, USB drives, etc... in the car). All CD/DVD devices were disabled and only administrators had access to a system where media could be loaded (after all the approval and scanning processes were completed).

    Mij
  • by ShieldW0lf ( 601553 ) on Friday November 21, 2008 @04:36PM (#25850337) Journal
    That's all well and good, but it's not going to stop grunts from using them to look at porn in the field. If I was going to do a cyber attack on the DoD, I'd be leaving virus infected DVDs full of porn lying around in occupied areas. You're pretty much guaranteed that it'll get passed from person to person.
  • Re:Windows.... (Score:3, Interesting)

    by Jamie's Nightmare ( 1410247 ) on Friday November 21, 2008 @04:53PM (#25850613)
    Get real. Security all comes down to the person who's task it is to implement it. Running Unix (or any compatible rip off) only gives you an additional layer of security through obscurity . Sorry fanboys, it's true. It's not a end all solution, and you would still need someone to take the time to plan for any possible security breach. Obviously, that includes any media (CDs, FlashDrives, Floppies) attached to the system. This isn't the first military fuckup, now you want to blame Microsoft instead of the brass simply because you think it's a chance to expand your following. Please.
  • Re:Auto-infect (Score:3, Interesting)

    by supernova_hq ( 1014429 ) on Friday November 21, 2008 @04:53PM (#25850619)

    While I agree with you (I disable it on ALL my systems), just image Joe Bob phoning Blizzard bitching that noting happened when he put the CD in the drive!

    But then again, I also believe that banking sites should authenticate to YOUR private key, that credit cards should have rolling pins and that it should be illegal to run windows on anything that handles security or financial information...

    While all these ideas seem sane, practical and necessary to me, the average person would become irate when they find out they can't just use the last 4 numbers of their phone number for their windows machine, bank pin, corporate login system and the key to their child's soul!

  • Re:Not News (Score:4, Interesting)

    by Ungrounded Lightning ( 62228 ) on Friday November 21, 2008 @04:55PM (#25850633) Journal

    Intelligence agencies did it to eliminate data paths out of the agency. DoD is doing it to eliminate malware paths into and within the agency.

  • by 602 ( 652745 ) on Friday November 21, 2008 @04:56PM (#25850659)
    The V.A.--at least the healthcare part of it-- banned these months ago to prevent data from wandering away..
  • by diegocgteleline.es ( 653730 ) on Friday November 21, 2008 @04:58PM (#25850713)

    There's no way you can automatically run code on a Linux computer by inserting a USB flash drive. It's just not possible. Those virus happen only because of Yet Another Windows Design Mistake - autorun.inf files that run executables.

    This has been a problem for years. Make a program that deletes all the files in a system. Put it into a CD along with a autorun.inf file. Burn the CD, don't write anything on it, and leave it near the office of someone you hate. At some point the guy will insert the CD just to check what's there. Boom. The virus will run automatically as soon as the CD is inserted.

    And there're more posibilities, like making a virus executable have a carpet icon. Since Windows hides extensions by default, people will double click the virus because they will think it's a carpet.

    These things can't happen in Linux (well, not really true, they can happen thanks to the shitty .desktop files that get "interpreted" by file managers even if they don't have execution +x permissions)

  • Bingo! (Score:3, Interesting)

    by snspdaarf ( 1314399 ) on Friday November 21, 2008 @05:13PM (#25850979)

    Get real. Security all comes down to the person who's task it is to implement it.

    Years ago, I was on a DoD facility where scheduling was being done on a UNIX box. Everyone there used the console for their work, everyone used the root account to do their work, and the password was written in on the first page of the book marked "Procedures" that was beside the console.

  • by whoever57 ( 658626 ) on Friday November 21, 2008 @05:33PM (#25851335) Journal

    Forgot to disable AutoRun, perhaps. But actually, it's quite non-intuitive how to disable AutoRun in Microsoft Windows.

    And then, after disabling Autorun, iTunes whines at you about it.

  • by Creepy Crawler ( 680178 ) on Friday November 21, 2008 @05:48PM (#25851577)

    Why is everything in Windows managed by tools that do not come with the default installation?

    I can perfectly manage a Linux installation without 3rd party or "optional" tools found on some website. Windows requires X tools that provide basic functionality on their site, and not default on the CD.

    I hate that.

  • by BoT_Bizarro ( 1349673 ) on Friday November 21, 2008 @05:54PM (#25851651)
    Yeah, what's more alarming is that the military is several years behind on their operating systems, such as running Windows 2000. They are even severely behind on applying patches to these machines as well, because of the amount of testing they require to patch a machine. So the rule of thumb: To infect the military, use an outdated attack and it will probably succeed.
  • by Anonymous Coward on Friday November 21, 2008 @11:40PM (#25855083)

    Many DoD installations use Sun Ray's, a server-based computing solution. Although the desktop unit has USB ports, policy can be set on the server about who can use what types of USB devices. Mass storage devices can be disabled altogether, if desired, and there's nothing the user can do to override that.

    Sounds like the Pentagon should have a look at an installation, maybe JICPAC. Combined with Trusted Solaris, it's about the most secure environment you can come up with. You can't even copy/paste between apps running in different zones.

    But even using Sun Rays with linux servers would be a huge leap.

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...