Jump to content

21 posts in this topic

Posted

[b]SAN FRANCISCO[/b] (Reuters) - Dire warnings from Washington about a "cyber Pearl Harbor" envision a single surprise strike from a formidable enemy that could destroy power plants nationwide, disable the financial system or cripple the U.S. government.

But those on the front lines say it isn't all about protecting U.S. government and corporate networks from a single sudden attack. They report fending off many intrusions at once from perhaps dozens of countries, plus well-funded electronic guerrillas and skilled criminals.

Security officers and their consultants say they are overwhelmed. The attacks are not only from China, which Washington has long accused of spying on U.S. companies, many emanate from Russia, Eastern Europe, the Middle East, and Western countries. Perpetrators range from elite military units to organized criminal rings to activist teenagers.

"They outspend us and they outman us in almost every way," said Dell Inc's chief security officer, John McClurg.

The big fear is that one day a major company or government agency will face a severe and very costly disruption to their business when hackers steal or damage critical data, sabotage infrastructure or destroy consumers' confidence in the safety of their information.

Elite security firm Mandiant Corp on Monday published a 74-page report that accused a unit of the Chinese army of stealing data from more than 100 companies. While China immediately denied the allegations, Mandiant and other security experts say the hacker group is just one of more than 20 with origins in China.

Chinese hackers tend to take aim at the largest corporations and most innovative technology companies, using trick emails that appear to come from trusted colleagues but bear attachments tainted with viruses, spyware and other malicious software, according to Western cyber investigators.

Eastern European criminal rings, meanwhile, use "drive-by downloads" to corrupt popular websites, such as NBC.com last week, to infect visitors. Though the malicious programs vary, they often include software for recording keystrokes as computer users enter financial account passwords.

Others getting into the game include activists in the style of the loosely associated group known as Anonymous, who favor denial-of-service attacks that temporarily block websites from view and automated searches for common vulnerabilities that give them a way in to access to corporate information.

An increasing number of countries are sponsoring cyber weapons and electronic spying programs, law enforcement officials said. The reported involvement of the United States in the production of electronic worms including Stuxnet, which hurt Iran's uranium enrichment program, is viewed as among the most successful.

Iran has also been blamed for a series of unusually effective denial-of-service attacks against major U.S. banks in the past six months that blocked their online banking sites. Iran is suspected of penetrating at least one U.S. oil company, two people familiar with the ongoing investigation told Reuters.

"There is a battle looming in any direction you look," said Jeff Moss, the chief information security officer of ICANN, a group that manages some of the Internet's key infrastructure.

"Everybody's personal objectives go by the wayside when there is just fire after fire," said Moss, who also advises the U.S. Department of Homeland Security.

Industry veterans say the growth in the number of hackers, the software tools available to them, and the thriving economic underground serving them have made any computer network connected to the Internet impossible to defend flawlessly.

[url="http://news.yahoo.com/analysis-near-impossible-battle-against-hackers-everywhere-080356080.html"]full story[/url]

Share this post


Link to post
Share on other sites

Posted

Everyone should just install Norton so they can't get hacked.
3 people like this

Share this post


Link to post
Share on other sites

Posted

no such thing as 'steal data' as the original data isn't lost,
it should read/write as 'copying/duplicating data'

Share this post


Link to post
Share on other sites

Posted

Corporations should plant false data -- maybe that would discourage hacks.

Share this post


Link to post
Share on other sites

Posted

I am sure a power plant could work without giving critical parts of it a network connection :rolleyes:

Share this post


Link to post
Share on other sites

Posted

[quote name='exotoxic' timestamp='1361727775' post='595540848']
I am sure a power plant could work without giving critical parts of it a network connection :rolleyes:
[/quote]

I was about to say, didn't power plants work fine before the net ?

Disconnect them, have one sandboxed machine/network for accessing the net, NOT connected to the rest of the plant
1 person likes this

Share this post


Link to post
Share on other sites

Posted

and whos stupid idea that power plants need to be connected to the internet ?

Share this post


Link to post
Share on other sites

Posted

[quote name='Torolol' timestamp='1361728444' post='595540862']
and whos stupid idea that power plants need to be connected to the internet ?
[/quote]

Anonymous'

Share this post


Link to post
Share on other sites

Posted

[quote name='Torolol' timestamp='1361728444' post='595540862']
and whos stupid idea that power plants need to be connected to the internet ?
[/quote]

Power plants are networked for efficiency and load balancing. Being able to talk to the substations allows them to put out the right amount of power to the right places at the right times.
1 person likes this

Share this post


Link to post
Share on other sites

Posted

[quote name='Enron' timestamp='1361717930' post='595540476']
Everyone should just install Norton so they can't get hacked.
[/quote]Not sure if trolling or serious...

Share this post


Link to post
Share on other sites

Posted

[quote name='Rudy' timestamp='1361761291' post='595541720']
Not sure if trolling or serious...
[/quote]

I hope he is not serious.

Share this post


Link to post
Share on other sites

Posted

[quote name='Rudy' timestamp='1361761291' post='595541720']
Not sure if trolling or serious...
[/quote]Obviously trolling, Everyone knows you need Zonealarm :p

Share this post


Link to post
Share on other sites

Posted

Setup a butt-ton of honeypot networks and monitor what tactics and methods are being used.

Share this post


Link to post
Share on other sites

Posted

[quote name='Enron' timestamp='1361717930' post='595540476']
Everyone should just install Norton so they can't get hacked.
[/quote]
I hope you were just being sarcastic.

Share this post


Link to post
Share on other sites

Posted

[quote name='Torolol' timestamp='1361728444' post='595540862']
and whos stupid idea that power plants need to be connected to the internet ?
[/quote]

It's a good idea but it seems to me it would be better to place them on private networks not connected to the Internet at large.

Share this post


Link to post
Share on other sites

Posted

Remember to remove your java, children!

Share this post


Link to post
Share on other sites

Posted

[quote name='Growled' timestamp='1361842921' post='595543752']
It's a good idea but it seems to me it would be better to place them on private networks not connected to the Internet at large.
[/quote]

That wouldn't exactly be very cheap to have that much dedicated fiber running throughout the country. Plus, sometimes it doesn't really matter. All it takes is an infected phone or flash drive to touch the power plant's internal network for them to be compromised with a nasty piece of malware. .

Share this post


Link to post
Share on other sites

Posted

[quote name='warwagon' timestamp='1361845713' post='595543818']
Remember to remove your java children!
[/quote]

But, I don't have any java children.

Share this post


Link to post
Share on other sites

Posted

Put important stuff on an isolated network. Problem solved.

Share this post


Link to post
Share on other sites

Posted

[quote name='Torolol' timestamp='1361718458' post='595540494']
no such thing as 'steal data' as the original data isn't lost,
it should read/write as 'copying/duplicating data'
[/quote]

It is stealing data, as in they didn't have that data/knowledge before. It can be used against a corporation, or governement entity. It's not like it's "just music" or something else.

Share this post


Link to post
Share on other sites

Posted

[quote name='Torolol' timestamp='1361718458' post='595540494']
no such thing as 'steal data' as the original data isn't lost,
it should read/write as 'copying/duplicating data'
[/quote]

The copy they made is stolen though.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.