by blake eifling n.
Skip this Video
Loading SlideShow in 5 Seconds..
By Blake Eifling PowerPoint Presentation
Download Presentation
By Blake Eifling

Loading in 2 Seconds...

  share
play fullscreen
1 / 7
Download Presentation

By Blake Eifling - PowerPoint PPT Presentation

adrina
93 Views
Download Presentation

By Blake Eifling

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cyber-Attack On Department Of Defense By Blake Eifling

  2. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may have started in Russia. Military experts could not say whether the attacks were in direct relation to the Russian government or carried out by individual computer hackers. Although the military computers are often attacked by outside hackers with viruses and worms, this attack was taken very seriously. In response to the attack, the U.S. Strategic Command has raised the security level while defense officials have ban the use of flash drives on military networks. The attacking program has been removed from a number of networks but officials have not yet cleansed the entire network. The Department of Defense would not describe the extent of the damage but did say that they are unclear on how the computers were infected. The agent.btz virus had been circulating nongovernmental computers for months prior to the attack on the DOD.

  3. agent.btz Worm • Agent.btz is in the category of Malware • Agent.btz is not a new virus • Origin of virus is unclear • Worm virus – Virus that self-replicates to other programs and systems. • Agent.btz has the ability to spread through shared drives and networks. “..when a clean computer attempts to map a drive letter to a shared network resource that has Agent.atz on it and the corresponding autorun.inf file, it will (by default) open autorun.inf file and follow its instruction to load the malware. Once infected, it will do the same with other removable drives connected to it or other computers in the network that attempt to map a drive letter to its shared drive infected with Agent.atz – hence, the replication.” (Threat Expert) http://www.napera.com/blog/?p=202

  4. Security Theater • Security theater consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. • This term is important in understanding some of the actions that have taken place within the DOD. • All flash drives were ban not only from the pentagon and DOD but in combat zones to prevent the spreading of the agent.btz worm. • This is theater because these actions only give the illusion of security and does nothing to prevent the spread of the virus since the virus can also be spread though networks.

  5. Device Fears • With the resent attack on the DOD, flash drives have been banned from use within the Pentagon and other defenses offices. • Also in 1998 with the release of the toy Furby, the NSA banned the toy from NSA offices for fear that the toy would be able to listen and repeat classified information. • With these devices and toys many have fears that they might be coded with some sorts of malware. • Because of its ability to repeat what it hears, Security Agency officials were worried "that people would take them home and they'd start talking classified,'‘ • How do you know that any device is safe against such viruses? • So is banning these drives and toys really fixing and/or preventing the problem?

  6. Comments/Quotes “ How do we know that it's not retaliation for an attack on Russian computers that originated from US military networks? “ “I'm not sure it matters. Whether US military computers were choosing to load and execute foreign code as a result of a foreign first strike, or a foreign counter-attack, we still have the situation that US military computers are loading and executing untrusted code, and apparently unsandboxed, so that it ended up mattering. No matter why the military computers were attacked, the fact that the attack worked proves incompetence. ” “ This is taking place during the transition between Administrations, so someone at the DoD hierarchy wants to make a show about how they are "protecting America" when everyone in the commercial sector dealt with the agent.btz trojan quietly months ago. “ “ I wouldn't put it past the MIC to exaggerate the risk of electronic attacks in order to manipulate the public. it certainly wouldn't be the first time the public was mislead about our nation's defense in order to funnel tax dollars into unnecessary defense projects. “

  7. Discussion Questions • Is there any way to prevent the spread of such viruses like the agent.btz? • Will you have more reservations about what kind of flash drive you purchase?