-->
The point of this is how this will be used - to further suppress free speech
White
House hit with primitive cyber-attack
The
Obama administration is trumpeting an alleged victory over a group of
hackers whom they say attempted to infiltrate a computer system used
by the White House.
RT,
1
October, 2012
Staffers
under US President Barack Obama have already confirmed that the Oval
Office is readying the release of a cybersecurity executive order to
be forced down the digital throats of every American any day now, and
the beating of war drums sounding off the start of an assault on
Internet freedoms is only getting louder. Now the White House says
that they have thwarted an attempt to attack a computer system
serving 1600 Pennsylvania Avenue, but the facts of the hack revealed
so far suggest the latest news is nothing more than the same
fear-mongering rhetoric used to unsuccessfully rally for a cyber-bill
in Congress.
The
Washington Free Beacon wrote Sunday, September 30, that sources
within the Washington defense and intelligence community confirmed on
condition of anonymity that hackers linked to the government of China
broke into a computer system used by the White House Military Office
for nuclear commands.
“One
official said the cyber breach was one of Beijing’s most brazen
cyber attacks against the United States and highlights a failure of
the Obama administration to press China on its persistent cyber
attacks,” Bill Gertz wrote for the Free Beacon.
On
Monday, the White House confirmed to POLITICO that a cyber-attack had
been attempted, but denied to confirm earlier allegations that
hackers involved were recruited by the Chinese. Their admission did,
however, explain the severity of the attack and suggests that the
so-called cyber breach was driven by primitive attempts to access the
emails of Obama administration staffers, not with stealth code but
with social engineering.
One
White House official speaking of the attack to POLITICO said the
alleged hacker or hackers employed "spear phishing” techniques
to try and access the Executive Branch’s systems, a method of
attack that often involves little more than masquerading as an
authorized agent over the Internet. A person behind spear phishing
may decide to adopt the identity of someone seemingly harmless, then
send emails to specifics targets within a certain business,
corporation or — in this case — a branch of federal government
and ask for information to be readily handed over.
Bruce
Scheiner, a computer security researcher, is quoted by The Norman
Transcript as explaining the attacks as such:
“It’s
a really nasty tactic because it’s so personalized. It’s an
e-mail from your mother saying she needs your Social Security number
for the will she’s doing. This is hacking the person, it’s not
hacking the computer.”
Spear-phishing
is listed on the FBI’s website as a popular method of perfecting
cyber-fraud, as well. There, the bureau says criminals “send
e-mails that look like the real thing to targeted victims, offering
all sorts of urgent and legitimate-sounding explanations as to why
they need your personal data,” only to try and dupe unsuspecting
saps into providing personal information or inadvertently downloading
malware that will target the networks accessed by that individual’s
device.
“[The]
victims are asked to click on a link inside the e-mail that takes
them to a phony but realistic-looking website, where they are asked
to provide passwords, account numbers, user IDs, access codes, PINs,
etc.,” the FBI adds.
But
is that really all these high-tech hackers had to do to drum up a
scare from the White House? Apparently.
To
Fox News, a White House official added Monday morning that the
assault was indeed a spear phishing attack that targeted an
unclassified network. Separately, a law enforcement official
described as a collaborator “with members of the White House
Military Office” said this latest cyber-scare was something all too
simple:
"This
[White House Communications Agency] guy opened an email he wasn't
supposed to open," the source said to Fox. "The attack
originated in the form of a spear phish, which involves a spoofed
inbound email with either a link to a malicious website or a
weaponized document attachment such as a .pdf, Microsoft Excel file
or Word document.”
In
other words, yes: sources speaking out on the assault so far confirm
that a crafty email attempting to extract information from a White
House staffer was sent to their inbox. And that was it.
Regardless,
the latest effort is all but certain to be used in the ongoing
charades that have helped craft a cybersecurity executive order
expected to be rolled out any moment now.
Earlier
this year, the US House of Representatives and Senate tried —
unsuccessfully — to draft legislation that would let the government
share information inputted in the private third-party servers of
business and corporations as to come into possession with Americans’
personal communications, all in the name of counterterrorism and
cybersecurity. Following the failure to advance any legislation, the
White House confirmed last month that they have indeed been at work
on an executive order, versions of which have already been leaked to
the Web.
"We
need to give this critical priority – it needs to be a discussion
at every level of our government and we must rapidly adopt new
technologies to protect our nation from this threat,” Anup Ghosh,
founder and CEO of security company Invincea, tells Fox after the
latest attempt to attack the White House.
"The
White House, every Fortune 1,000 and Global 2,000 organization –
medium-sized business, small businesses, consumers – ALL are at
risk from spear-phishing attacks,” Ghosh adds. The reason, however,
isn’t because networks are necessarily vulnerable — it’s the
people who can put the White House’s security at stake by opening a
single email attachment that can unleash a virus on the Obama
administration’s system.
"Today,
training is the primary solution to this problem … and training
simply does not work,” Ghosh says.
Ignorance,
one would have it then, is enough to add one more reason to the White
House’s list for unveiling their cybersecurity executive order.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.