{"id":685,"date":"2012-01-28T21:58:43","date_gmt":"2012-01-28T21:58:43","guid":{"rendered":"https:\/\/noi3.org\/site\/?p=685"},"modified":"2012-01-28T21:58:43","modified_gmt":"2012-01-28T21:58:43","slug":"china-based-cyber-attack-targets-dod-access-cards","status":"publish","type":"post","link":"https:\/\/site.noi3.org\/?p=685","title":{"rendered":"China-based Cyber Attack Targets DoD Access Cards"},"content":{"rendered":"<div id=\"article_page_1\">\n<p> \t\t<span style=\"font-size:12px;\">Cyber security firms have discovered a computer virus that uses servicemembers&rsquo; network security cards to hack into government networks.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">How does it work? servicemembers receive an email with an official-looking PDF file connected to the virus that allows it to record keystrokes, said Jaime Blasco, lab manager for Alien Vault, a California-based cyber security firm. The virus then collects a service member&rsquo;s personal identification number associated with a Common Access Card when he logs into a government computer.<\/span><\/p>\n<p> \t <!--more-->  \t<\/p>\n<p> \t\t<span style=\"font-size:12px;\">&ldquo;The hackers can get in pretty easily with this virus and do whatever they want on a government computer while a soldier just works on his computer,&rdquo; Blasco said in a phone interview from his office in Spain.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Blasco said he suspects the cyber attack originates from China because of the Chinese characters found within the virus&rsquo; coding.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">&ldquo;Since we started tracing it &hellip; we found software that&rsquo;s only really used in China,&rdquo; Blasco said. &ldquo;We&rsquo;re 99 percent sure this attack is coming from China. Not 100 percent sure, but we&rsquo;re pretty sure.&rdquo;<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">The Defense Department is aware of the virus strain called &ldquo;Sykipot,&rdquo; according to multiple news reports. Pentagon officials didn&rsquo;t respond to a request for comment.<br \/> \t\tBlasco said he has spoken to cyber-experts working for the U.S. government about the virus strain.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">&ldquo;They know about it and are working on it,&rdquo; Blasco said.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Alien Vault has tracked the virus for three months. Blasco said he&rsquo;s not sure what sort of information the hackers have targeted.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">The military is not the sole target. The virus could have hit other U.S. government agencies such as the State Department.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">The only way to protect against Sykipot is to train servicemembers not to open the PDF attachment. Hackers often disguise their poisoned email attachments as government documents, Blasco said.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Called &ldquo;CAC cards&rdquo; by servicemembers, the CAC doubles as an identification card for servicemembers and most contractors. A computer chip is embedded into the card that also contains the owner&rsquo;s photo.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">servicemembers must insert their CAC in order to log onto government computers. servicemembers use their CAC to access the military&rsquo;s secret and top-secret cyber networks.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Cyber officials say the CAC system is more secure than one that uses only passwords. However, a report published last year by the cyber security firm Maniant documented multiple cyber attacks in which hackers targeted identification card systems.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Defense Secretary Leon Panetta and other senior DoD officials have called cyber attacks one of the greatest threats to national security, and an arena in which the U.S. military is the farthest behind.<\/span><\/p>\n<p> \t\t<span style=\"font-size:12px;\">Panetta has implored Congress to increase funding to improve research and development for cyber weapons, even as other areas in the defense budget shrink or grow at a reduced rate.<\/span><\/p>\n<p> \t\t&nbsp;<\/p>\n<p> \t\t<span style=\"font-size:12px;\">Articolul original: <a href=\"http:\/\/www.military.com\/news\/article\/china-suspected-in-attacks-on-dod-computer-cards.html?ESRC=eb.nl\">aici<\/a><\/span><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security firms have discovered a computer virus that uses servicemembers&rsquo; network security cards to hack into government networks. How does it work? servicemembers receive&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[325,124,326],"class_list":["post-685","post","type-post","status-publish","format-standard","hentry","category-armata","tag-atac","tag-china","tag-cibernetic"],"_links":{"self":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts\/685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=685"}],"version-history":[{"count":0,"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts\/685\/revisions"}],"wp:attachment":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}