logo Welcome, Guest. Please Login or Register.
2025-04-10 06:25:34 CoV Wiki
Learn more about the Church of Virus
Home Help Search Login Register
News: Open for business: The CoV Store!

  Church of Virus BBS
  General
  Science & Technology

  China Link Suspected in Lab Hacking
« previous next »
Pages: [1] Reply Notify of replies Send the topic Print 
   Author  Topic: China Link Suspected in Lab Hacking  (Read 1050 times)
Walter Watts
Archon
*****

Gender: Male
Posts: 1571
Reputation: 8.24
Rate Walter Watts



Just when I thought I was out-they pull me back in

View Profile WWW E-Mail
China Link Suspected in Lab Hacking
« on: 2007-12-09 18:13:50 »
Reply with quote

and the fun continues...........
"We have nothing to fear but fearmongers"
--Walter
---------------------------------------------------------------
The New York Times
December 9, 2007

China Link Suspected in Lab Hacking

By JOHN MARKOFF

SAN FRANCISCO, Dec. 8 — A cyber attack reported last week by one of the federal government’s nuclear weapons laboratories may have originated in China, according to a confidential memorandum distributed Wednesday to public and private security officials by the Department of Homeland Security.

Security researchers said the memorandum, which was obtained by The New York Times from an executive at a private company, included a list of Web and Internet addresses that were linked to locations in China. However, they noted that such links did not prove that the Chinese government or Chinese citizens were involved in the attacks. In the past, intruders have compromised computers in China and then used them to disguise their true location.

Officials at the lab, Oak Ridge National Laboratory in Tennessee, said the attacks did not compromise classified information, though they acknowledged that they were still working to understand the full extent of the intrusion.

The Department of Homeland Security distributed the confidential warning to computer security officials on Wednesday after what it described as a set of “sophisticated attempts” to compromise computers used by the private sector and the government.

Government computer security officials said the warning, which was issued by the United States Computer Emergency Response Team, known as US-CERT, was related to an October attack that was also disclosed last week by officials at the Oak Ridge laboratory.

According to a letter to employees written by the laboratory’s director, Thom Mason, an unknown group of attackers sent targeted e-mail messages to roughly 1,100 employees as part of the ruse.

“At this point, we have determined that the thieves made approximately 1,100 attempts to steal data with a very sophisticated strategy that involved sending staff a total of seven ‘phishing’ e-mails, all of which at first glance appeared legitimate,” he wrote in an e-mail message sent to employees on Monday. “At present we believe that about 11 staff opened the attachments, which enabled the hackers to infiltrate the system and remove data.”

In a statement posted on the laboratory’s Web site, the agency stated: “The original e-mail and first potential corruption occurred on October 29, 2007. We have reason to believe that data was stolen from a database used for visitors to the Laboratory.”

The laboratory said the attackers were able to gain access to a database containing personal information about visitors to the laboratory going back to 1990.

The US-CERT advisory, which was not made public, stated: “The level of sophistication and the scope of these cyber security incidents indicate that they are coordinated and targeted at private sector systems.”

The US-CERT memo referred to the use of e-mail messages that fool employees into clicking on documents that then permit attackers to plant programs in their computers. These programs are then able to copy and forward specific data — like passwords — to remote locations.

Despite improvements in computer security, phishing attacks are still a big problem. In the case of the Oak Ridge intrusion, the e-mail messages were made to seem authentic. One described a scientific conference and another referred to a Federal Trade Commission complaint.

Computer security researchers cautioned that despite the US-CERT description of the attacks as sophisticated, such threats are frequently undertaken by amateur computer hackers.

Classified federal computer networks are not supposed to be connected physically to the open Internet. Even so, sensitive data like employee e-mail databases can easily be compromised once access is gained to computers inside federal agencies.


Copyright 2007 The New York Times Company

Report to moderator   Logged

Walter Watts
Tulsa Network Solutions, Inc.


No one gets to see the Wizard! Not nobody! Not no how!
Fritz
Adept
*****

Gender: Male
Posts: 1746
Reputation: 7.92
Rate Fritz





View Profile WWW E-Mail
Re:China Link Suspected in Lab Hacking
« Reply #1 on: 2008-03-24 01:44:43 »
Reply with quote

Looks like China is willing go to one on one, as well, in Cyber Space not just the high profile Federal stuff.

Humans using technology .... whatever happened to using Cyber Space for what it was designed ..... PORN .... oh yes and total mutual nuclear destruction.

Fritz


http://www.theregister.co.uk/2008/03/22/pro_tibetan_groups_targeted/

Cyber attacks target pro-Tibetan groups
Barrage of the trojans
By Dan Goodin in San Francisco → More by this author
Published Saturday 22nd March 2008 17:48 GMT


Groups sympathetic to anti-Chinese protesters in Tibet are under assault by cyber attackers who are embedding malware in email that appears to come from trusted colleagues.

The email is being sent to members of human-rights groups. The messages include attachments in PDF, Microsoft Word and Excel formats, that install keyloggers and other types of malware once they're opened. The malicious payloads have been disguised to evade detection by anti-virus scanners.

"Groups working for freedom of Tibet all over the world have been targeted," says anti-virus supplier F-Secure in blog post. "These emails have been sent to mailing lists, private forums and directly to persons working inside pro-Tibet groups. Some individuals have received targeted attacks like this several times a month."

Names of attached files include UNPO Statement of Solidarity.pdf, Daul-Tibet intergroup meeting.doc and tibet_protests_map_no_icons__mar_20.ppt. Once opened the files deliver documents that appear to contain legitimate content in support of the protests. Behind the scenes, though, the malware is installed.

The cyber attacks come amid riots in the Tibetan capitol of Lhasa between protesters and Chinese soldiers. According to the Tibetan government-in-exile, at least 99 people have been killed in the crackdown. Chinese officials put the official death toll at 19.

While the violence has flared up only recently, cyber attacks against critics of the Chinese government date back to at least 2002, according to SANS. Past targets include Falun Gong and the Uyghurs.

Reports of the attacks came as several news agencies said Chinese authorities placed "most wanted" posters of 21 rioters on Chinese web portals and television stations. According to some reports, the images ran for a time on the Chinese sites for both MSN and Yahoo. Two of the suspects have already been arrested. ®
Report to moderator   Logged

Where there is the necessary technical skill to move mountains, there is no need for the faith that moves mountains -anon-
Fritz
Adept
*****

Gender: Male
Posts: 1746
Reputation: 7.92
Rate Fritz





View Profile WWW E-Mail
Re:"How to Take Down the Power Grid"
« Reply #2 on: 2008-04-10 12:50:00 »
Reply with quote

Security, Hacking, 'ya got ta luv it' and where is Bruce Willis when you need him :-)  ...  Interesting video at the site tied to the story.

Cheers

Fritz


http://www.news.com/8301-10784_3-9914896-7.html?tag=nl.e501


April 8, 2008 6:58 PM PDT
Breaking into a power station in three easy steps
Posted by Elinor Mills | 21 comments 

"I will tell (you) how to break into a nuclear reactor," Ira Winkler, president of security firm ISAG said as he launched into his presentation on "How to Take Down the Power Grid" at RSA 2008 on Tuesday night.
"Frankly, it's really easy to break into the power grid," he said. "It happens all the time."
First, you set up a Web server that downloads spyware onto the computers that visit.
Second, you send an e-mail to people who work inside a power station that entices them to click on a hyperlink to the Web server with the spyware. Warning them that their human resources benefits are going to be cut and sending them to a Web site with "hr.com" in the domain would work, according to Winkler, who said he has done this several times in company-approved penetration tests.
Third, you wait as the recipients--and everyone else they forwarded the e-mail to--visit the server and get infected.
"Then we had full system control," he said. "Once the malware was downloaded onto their systems...we could see the screens and manipulate the cursors."
It took about a day to set up the attack and was effective within minutes, according to Winkler.
"It had to be shut down after a couple of hours because it was working too well," he said.
This is akin to social engineering attacks that happen all the time, but this attack has more far-reaching consequences than most such attacks.
Power stations running special SCADA control software have the perception that they are more secure than other networked systems. However, they are just as vulnerable because they are connected to the Internet and run on computers that also run Windows NT, he said.
"Things are really this bad," Winkler said. "I'm not exaggerating."
Below is a video showing a staged cyber attack on a power station that Winkler showed during his presentation:
.
video.....at site
Report to moderator   Logged

Where there is the necessary technical skill to move mountains, there is no need for the faith that moves mountains -anon-
Fritz
Adept
*****

Gender: Male
Posts: 1746
Reputation: 7.92
Rate Fritz





View Profile WWW E-Mail
Re:China Link Suspected in Lab Hacking
« Reply #3 on: 2008-06-12 11:55:36 »
Reply with quote

Interesting how China seems to be, becoming 'the go to guy' of more and more of our ills; is this 'meming' ?

Cheers

Fritz

PS Hermit, Is this the formating you were hoping for ?


Chinese crackers blamed for US power blackouts
Lights go out, firewalls come tumbling down
By John Leyden → More by this author http://ttp://search.theregister.co.uk/?author=John%20Leyden
Published Monday 2nd June 2008 13:04 GMT
 
Chinese hackers have been blamed for two sets of cyber attacks that left US homes without electricity in recent years.
Two blackouts in Florida and the Northeast were at least partially caused by Chinese crackers, computer security experts told http://tp://www.nationaljournal.com/njmagazine/cs_20080531_6948.php the National Journal Magazine.
The magazine bases its claims principally on Tim Bennett, former president of the Cyber Security Industry Alliance, who said that US spooks told him back in 2003 that crackers working on behalf of the Chinese National Liberation Army had gained access to the network controlling power plants in the north eastern US.
This intrusion "may have precipitated" a power outage that affected large swathes of the US in August 2003. The blackout - which affected New York, Michigan, Ohio and parts of Canada - hit 50 million homes and was officially blamed on a cascading failure arising from a failure to deal with the outage of a set of high-voltage lines, which had a knock-on affect on around 100 power plants.
The spread of the Blaster worm at the time may have hampered communications, hampering efforts to fix the problem.
Bennett also blames a February blackout in south Florida that left three million homes without electricity on computer hackers. A second security consultant, speaking anonymously, said that the Florida hack was down to a Chinese PLA hacker who made a mistake while attempting to produce a map of Florida Power & Light’s systems. Power & Light blames an error by an engineer who disabled backup systems while making repairs on the outage. An official inquiry is ongoing.
Joel Brenner, the government’s senior counterintelligence official, was quizzed by the National Journal Magazine on the issue and said such attacks might be possible. Targeted Trojan attacks against senior executive and government officials in the West have been widely blamed on China, but attacks on utilities would be far more difficult to pull off.
Back in January CIA senior analyst Tom Donahue created controversy with claims that crackers have blackmailed foreign governments after disrupting the operating of utilities. Skeptics said the unspecified claims lack credibility, although other security experts subscribe to the possibility of attacks against Supervisory Control And Data Acquisition (SCADA) systems seriously.
SCADA systems lie at the heart of utility control networks. The devices allow utilities, such as electricity plants, to remotely control and monitor generation equipment and substations over phone lines, radio links and, in more and more cases, IP networks.
Interconnection between SCADA environments and corporate networks introduce new security risks that weren't so much of a concern in the previous era of closed control networks.
Reports of successful cyber attacks on utility systems are rare but not unprecedented.
Seven years ago a disgruntled ex-employee of an Australian hotel hacked http://://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/into a water control system and swamped the grounds with sewage. In Russia, malicious crackers managed to take control http://w.theregister.co.uk/2000/04/27/russia_welcomes_hack_attacks/ of a gas pipeline for around a day in 1999. Closer to home, in the case of the latest US blackouts, the Slammer worm affected the corporate network at Ohio's inactive Davis-Besse nuclear plant and disabled http://ttp://www.theregister.co.uk/2003/08/20/slammer_worm_crashed_ohio_nuke/ a safety monitoring system for nearly five hours in January 2003. ®
Report to moderator   Logged

Where there is the necessary technical skill to move mountains, there is no need for the faith that moves mountains -anon-
Hermit
Archon
*****

Posts: 4289
Reputation: 8.50
Rate Hermit



Prime example of a practically perfect person

View Profile WWW
Re:China Link Suspected in Lab Hacking
« Reply #4 on: 2008-06-12 13:16:21 »
Reply with quote

[Fritz] PS Hermit, Is this the formating you were hoping for ?

[Hermit]

Taking, as an example, just this line:
[Fritz] By John Leyden → More by this author http://search.theregister.co.uk/?author=John%20Leyden

I suspect it currently looks like this:
Code:
By John Leyden → More by this author [url]http://search.theregister.co.uk/?author=John%20Leyden[/url]


Where I would have made it look like this:
Code:
[b]Authors: [/b][url=http://search.theregister.co.uk/?author=John%20Leyden]John Leyden[/url]


Yielding:
Authors: John Leyden


Helpful?

Kind Regards

Hermit
« Last Edit: 2008-06-12 13:21:47 by Hermit » Report to moderator   Logged

With or without religion, you would have good people doing good things and evil people doing evil things. But for good people to do evil things, that takes religion. - Steven Weinberg, 1999
Fritz
Adept
*****

Gender: Male
Posts: 1746
Reputation: 7.92
Rate Fritz





View Profile WWW E-Mail
Re:formating posts
« Reply #5 on: 2008-06-12 13:26:52 »
Reply with quote


Thx Hermit .... got it.  Cheers Fritz (clearly RTFM on my part)
Report to moderator   Logged

Where there is the necessary technical skill to move mountains, there is no need for the faith that moves mountains -anon-
Pages: [1] Reply Notify of replies Send the topic Print 
Jump to:


Powered by MySQL Powered by PHP Church of Virus BBS | Powered by YaBB SE
© 2001-2002, YaBB SE Dev Team. All Rights Reserved.

Please support the CoV.
Valid HTML 4.01! Valid CSS! RSS feed