2008 cyberattack on United States

2008 cyberattack on United States

The 2008 cyberattack on the United States was the "worst breach of U.S. military computers in history". The defense against the attack was named "Operation Buckshot Yankee". It led to the creation of the United States Cyber Command.[1][2][3]

History

It started when a USB flash drive infected by a foreign intelligence agency was left in the parking lot of a Department of Defense facility at a base in the Middle East. It contained malicious code and was put into a USB port from a laptop computer that was attached to United States Central Command.[1][2]

The Pentagon spent nearly 14 months cleaning the worm, named agent.btz, from military networks. Agent.btz, a variant of the SillyFDC worm, has the ability "to scan computers for data, open backdoors, and send through those backdoors to a remote command and control server."[4]

References

  1. ^ a b "Defense Department Confirms Critical Cyber Attack". Eweek. August 25, 2010. http://www.eweek.com/c/a/Security/Defense-Department-Confirms-Critical-Cyber-Attack-551206/. Retrieved 2010-08-25. "A senior Pentagon official has revealed details of a previously-classified malware attack he declared "the most significant breach of U.S. military computers ever." In an article for Foreign Affairs, Deputy Defense Secretary William J. Lynn III writes that in 2008, a flash drive believed to have been infected by a foreign intelligence agency uploaded malicious code onto a network run by the military’s Central Command. ..." 
  2. ^ a b William J. Lynn III. "Defending a New Domain". Foreign Affairs (journal). http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain. Retrieved 2010-08-25. "In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. The flash drive's malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary." 
  3. ^ Knowlton, Brian (August 25, 2010). "Military Computer Attack Confirmed". New York Times. http://www.nytimes.com/2010/08/26/technology/26cyber.html?_r=1&ref=technology. Retrieved 2010-08-26. 
  4. ^ Shachtman, Noah. "Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack", The Brookings Institution, 25 August 2010.

Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • United States Cyber Command — U.S. Cyber Command emblem Active 2009–current Country …   Wikipedia

  • Chinese intelligence operations in the United States — The People s Republic of China (PRC) has and is currently using a widespread effort to acquire U.S. military technology and classified information. To fulfill its long term military development goals, the PRC uses a variety of methods to obtain U …   Wikipedia

  • Cyberwarfare in the United States — is the United States Cyber Commands military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack.[1] The United States Department of Defense sees the use of computers and the Internet to conduct warfare in… …   Wikipedia

  • Cyberattaque de 2008 contre les États-Unis — En 2008, les États Unis ont subi une importante cyberattaque contre leurs installations militaires[1]. En date de 2010, ce serait la « pire intrusion historique contre des ordinateurs militaires des É. U[trad 1]. ». Elle a mené à la… …   Wikipédia en Français

  • Cyberattacks during the 2008 South Ossetia war — The website of the Parliament of Georgia (parliament.ge) had its content replaced with a montage of photos depicting Mikheil Saakashvili and Adolf Hitler. The Russian language caption reads, He too will come to an end as well. [1] During the …   Wikipedia

  • Cyberwarfare — Cyberwar redirects here. For the video game, see Cyberwar (video game). For the 2004 movie, see Cyber Wars (film). For the 1999 MMOG, see Cyber Wars. Computer security Secure operating systems Security architecture Security by design …   Wikipedia

  • Cyberwarfare in the People's Republic of China — The nature of Cyberwarfare in the People s Republic of China is difficult to assess. Government officials in India and the United States have traced various attacks on corporate and infrastructure computer systems in their countries to computers… …   Wikipedia

  • Cyberkrieg — ist zum einen die kriegerische Auseinandersetzung im und um den virtuellen Raum, den Cyberspace, mit Mitteln vorwiegend aus dem Bereich der Informationstechnik. Cyberkrieg bezeichnet zum anderen die hochtechnisierten Formen des Krieges im… …   Deutsch Wikipedia

  • 2007 cyberattacks on Estonia — Cyberattacks on Estonia refers to a series of cyber attacks that began April 27, 2007 and swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country s row with… …   Wikipedia

  • CNN — For other uses, see CNN (disambiguation). Cable News Network CNN lo …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”