Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Cyber-intruder sparks massive federal response

  • Please log in to reply
2 replies to this topic

#1 Union_Thug


    Bleeps with the fishes...

  • Members
  • 2,355 posts
  • Gender:Male
  • Location:is everything
  • Local time:05:22 PM

Posted 10 December 2011 - 02:55 PM


The first sign of trouble was a mysterious signal emanating from deep within the U.S. military's classified computer network. Like a human spy, a piece of covert software in the supposedly secure system was "beaconing" — trying to send coded messages back to its creator.


The government's top cyberwarriors couldn't immediately tell who created the program or why, although they would come to suspect the Russian intelligence service. Nor could they tell how long it had been there, but they soon deduced the ingeniously simple means of transmission, according to several current and former U.S. officials. The malicious software, or malware, caught a ride on an everyday thumb drive that allowed it to enter the secret system and begin looking for documents to steal. Then it spread by copying itself onto other thumb drives.

Pentagon officials consider the incident, discovered in October 2008, to be the most serious breach of the U.S. military's classified computer systems. The response, over the past three years, transformed the government's approach to cybersecurity, galvanizing the creation of a new military command charged with bolstering the military's computer defenses and preparing for eventual offensive operations. The efforts to neutralize the malware, through an operation code-named Buckshot Yankee, also demonstrated the importance of computer espionage in devising effective responses to cyber­threats.

BC AdBot (Login to Remove)


#2 Nawtheasta


  • Members
  • 403 posts
  • Location:New England, USA
  • Local time:05:22 PM

Posted 10 December 2011 - 03:02 PM

A few years back I talked with an AF officer. He noticed that the new thumb drives they issued were made in China.They were manufacturer sealed and did not seem to have been tested before issuing. He questioned the use of these and was told they were from an approved supplier and there were no problems.
i believe I have read recently that the use of thumb drives is tightly controlled or altogether banned.

#3 Layback Bear

Layback Bear

  • Members
  • 1,880 posts
  • Gender:Male
  • Location:Northern Ohio
  • Local time:04:22 PM

Posted 06 January 2012 - 11:59 AM

Why oooh Why, would a thumb drive or any other thing be allowed to be plugged into one of our Nation secret computer/information networks???? Why isn't everything from motherboards, bios, ram, ect. be checked before a computer or and other thing such as a printer not be checked before being allowed to be used??? I think this is basic security 101.
Thank you Thug for the information!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users