Use your computer fearlessly.

Mission Services Articles Research

everyone: older news

business: military: Espionage, Reactors Redux, Reactors, NATO

Military Cyber-Espionage

by Brent Kirkpatrick

(Date Published: .)

Our rivals want to hack classified and sensitive documents.

Several notable military hacks have occurred last year and early this year. In fall 2016, a hack in Australia breached U.S. arms data. In Sept. 2016, a hack in South Korea breached classified documents on a military intranet. During spring 2017, there were hacks of NATO soldier cell phones in the Baltic states of Eastern Europe.

In the Australia hack in fall 2016, weak username and password combinations were used together with a weakness in the help-desk portal to breach sensitive documents on arms sales. These documents contained cyberwarfare details, information about new warships, details about a sale of F-25 fighters to Australia, details about Boeing P-8 Poseidon anti-sub jets, details of C-130 Hercules transport aircraft, and details about guided bombs.

laptop with camouflage pants

In the South Korea hack in Sept 2016, an intranet, believed to be air-gaped from the Internet, was breached using an antivirus software. The cyber-attack first focused on an anti-virus software, embedded malware into the antivirus, and then exploited an intranet that was accidentally left connected to the Internet. Classified documents were breached which included joint U.S.-South Korea plans to decapitate the North Korean government.

In the NATO attacks in spring 2017, the personal cell phones of NATO soldiers were targeted. Soldiers were stalked, and their personal information reveled to them by the attackers. The NATO command is concerned that attacks such as these could be used to track troop movements and deployments.

Clean-Up (TM). Incident response driven by data and AI.

Thomas Grove, Julian E. Barnes, and Drew Hinshaw. "Russia targets NATO soldiers in phone hack." Wall Street Journal. Oct 5, 2017.

Rob Taylor. "Australia hack nets data on U.S. arms." Wall Street Journal. Oct. 15, 2017.

Timothy W.Martin and Kwanwoo Jun. "Internet connection enabled Seoul hack." Wall Street Journal. Oct. 12, 2017.

Business Articles:

Why Clean-Up Hacking?
Cascading Data Breaches
Incident Response Plan
Rapid Containment of Intrusions

Incident Response, Part 1: Planning
Incident Response, Part 2: Response
Incident Response, Part 3: Coordination
Incident Response, Part 4: Strategy
Incident Response, Part 5: Recovery
Incident Response, Part 6: Investigation
Incident Response, Part 7: Evolution

What Is New? | Contact | Tips

© 2015-2021 Intrepid Net Computing. All rights reserved.