Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Military Security United States IT Technology

Pentagon Confirms 2008 Computer Breach — 'Worst Ever' 157

jowifi writes "The New York Times reports that the Pentagon has confirmed that, in 2008, a foreign agent instigated 'the most significant breach of US military computers ever' using a USB flash drive. While the breach was previously reported on Wired and the LA Times, this is the first official confirmation of the attack that led to the banning of USB drives on government computers."
This discussion has been archived. No new comments can be posted.

Pentagon Confirms 2008 Computer Breach — 'Worst Ever'

Comments Filter:
  • by mlts ( 1038732 ) * on Thursday August 26, 2010 @05:47PM (#33386602)

    This is likely why Windows 7 has explicit GPOs to either set USB flash drives read-only, or deny them the ability to mount whatsoever. Other programs that have this functionality are PGP Universal, and Symantec Endpoint Protection.

    Now, if MS can put autoplay/autorun to rest six feet under with Clippy and Bob, that would be a good security advance.

  • by mangu ( 126918 ) on Thursday August 26, 2010 @05:53PM (#33386676)

    the attack that led to the banning of USB drives on government computers.

    This reminds me of the joke of the man that, having learned that his wife was fucking other men in the couch in the living room, moved the couch to the garage.

    USB drives have a purpose for legal uses. Wouldn't it be better to improve their systems so that USB drives couldn't be used in harmful ways?

  • by yourpusher ( 161612 ) on Thursday August 26, 2010 @06:02PM (#33386782) Homepage Journal

    Rob Rosenberger at VMyths notes: [vmyths.com]

    et’s cut to the chase. U.S. Deputy Defense Secretary William J. Lynn III wrote an op-ed for a commercial publication in which he claims a single USB thumb drive caused the worst military data breach in history. And according to Wikipedia, that one little USB stick led to the creation of the Pentagon’s new Cyber Command.
    [. . .]

    I’ll bet it took so long only because it was a classified operation. This malware would have blown over in a week if DoD-CERT had issued an email saying “hey, there’s a new virus running around, please scan your PCs for agent.btz.”

    {sniff} I can definitely smell a lot of groupthink here. Not to mention hype, which goes hand in hand with groupthink.

    Lynn suffers from a short memory span. We know this because he thinks the Pentagon got “a wake-up call” when agent.btz slithered into classified networks. If Lynn’s brain had more RAM, he would recall the Melissa virus did EXACTLY the same thing in 1999. It infected classified U.S. networks at a depth & scope even I myself would label “impressive.”

    So why this story? Well (from the same source):

    You can see I’ve got a healthy dose of skepticism over Lynn’s “Buckshot Yankee” revelation. And I’m not alone: Wired filed a story with the headline “Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack.”

    Waitaminit. GCN’s breathless story includes the phrase “Lynn said Wednesday in a teleconference with reporters.” You mean to say he gabbed with the media on top of all the hype he wrote in an official capacity for a commercial publication? {sniff} I smell a book deal in the works when Lynn’s boss retires next year.

  • by devent ( 1627873 ) on Thursday August 26, 2010 @06:11PM (#33386872) Homepage

    So, what system the computer were running? Why is that information never in this news reports? Are they assuming that computers just runs, without any software on it? Don't they know that computers usually have an operation system on it to be useful?

    I really had it now. I clicked through the pages and agent.btz is mentioned. Nobody had mentioned that's a Windows worm Worm:W32/Agent.BTZ http://www.f-secure.com/v-descs/worm_w32_agent_btz.shtml [f-secure.com] Platform is Windows 32, of course. Why is nobody is mentioning the operation system? Why is nobody blaming Microsoft? Oh George W. Bush was briefed on it, was he briefed on it that the worm is only useful on Windows systems and that his military is vulnerable?

    His article appeared intended partly to raise awareness of the threat to United States cybersecurity — “the frequency and sophistication of intrusions into U.S. military networks have increased exponentially,” he wrote — and partly to make the case for a larger Pentagon role in cyberdefense.

    How about they mentioning that's it's increased on Windows and that Linux and other systems are save and sound? How about they ditched this system which proved times after times after times to be the only system that is vulnerable?

  • by Ethanol-fueled ( 1125189 ) * on Thursday August 26, 2010 @06:27PM (#33387010) Homepage Journal
    There are ways to hide stuff like that from view on Windows. They magically show up when the USB device is plugged into a Linux box.

    Related note: A similar piece of malware and the ensuing hassle is what prompted me to switch to Linux for good.
  • by dgatwood ( 11270 ) on Thursday August 26, 2010 @07:54PM (#33387854) Homepage Journal

    There should never have been a way to enable autorun in the first place. The very notion of automatically executing code or installers form a piece of media without the user explicitly taking any action is antithetical to proper security.

  • by guruevi ( 827432 ) on Thursday August 26, 2010 @07:58PM (#33387890)

    After actually having implemented such a methods, it is noticed that nobody ever uses the classified network except for highly official stuff, when the project is done. It seems that all work in progress is just being saved on the non-classified network.

    Trust me, I have implemented just about any security method in a variety of settings (medical, financial, ...). The fact remains that people can't be bothered to lock their screens when they step out because it's "too difficult" and "too complicated" let alone click the button to encrypt their e-mail or their USB sticks.

  • by WindBourne ( 631190 ) on Thursday August 26, 2010 @09:33PM (#33388478) Journal
    Considering that there are more https servers with CC info on them running Linux/Unix, I would say that your logic is incorrect. The simple fact is, that ppl/crackers go after the EASY systems.

    For example, why go to a house, with a burgler alarm, no windows, doors that you have to pick, that has $100 million if you can go to anther house that has basically no alarm, has open backdoors, and has only $1 million, though they MIGHT have a key to get into the OTHER Place, though you also get to the 100 million EASY? And even better yet, is finding the same easy system that has no money BUT also might contain the key to the above 100 million system.

    I will take the one that is easy to get into to. So do the blackhats.

An authority is a person who can tell you more about something than you really care to know.

Working...