Skip to content

Unexplainable.net

Watching The World Change

  • Grey Anatomy UFOs and Aliens
  • End of Year Recap: Archeology News April 2009 Other Exciting News
  • Dinosaurs in the News 2 , November 2010 Other Exciting News
  • Mufon Sniffs Out Hoax UFOs and Aliens
  • 2010: The Year of Science Fiction Reality Information and Theories
  • Bible Verses: Children II Religion Articles
  • Oceanic Whirlpool Mystery Puzzles Scientists Unexplainable Weather
  • The Supernatural Adventures Of Carl Kolchak Personal Accounts

Chinese Hackers Hack White House Military Office Used For Nuclear Commands

Posted on October 1, 2012 By jim No Comments on Chinese Hackers Hack White House Military Office Used For Nuclear Commands

White House sources partly confirmed an alarming report that U.S. government computers, reportedly including systems used by the military for nuclear commands, were breached by Chinese hackers.

“This was a spear phishing attack against an unclassified network,” a White House official said. “These types of attacks are not infrequent and we have mitigation measures in place.”

A law enforcement official who works with members of the White House Military Office confirmed the Chinese attack on Monday, but it remains unclear what information, if any, was taken or left behind.

“This White House Communications Agency guy opened an email he wasn’t supposed to open,” the source said.

That email contained a spear phishing attack from a computer server in China, the law enforcement source said. The attack was first reported by the blog Free Beacon. Spear phishing involves the use of messages disguised to appear as valid; in fact, they contain targeted, malicious attempts to access sensitive or confidential information.

By opening the email, which likely contained a link to a malicious site or some form of attachment, the agency member allowed the Chinese hacker to access a system, explained Anup Ghosh, founder and CEO of security company Invincea.

“The attack originated in the form of a spear phish, which involves a spoofed inbound email with either a link to a malicious website or a weaponized document attachment such as a .pdf, Microsoft Excel file or Word document,” he said.

Free Beacon claimed that the U.S. government’s most sensitive networks were breached in the incident, which took place early last month.

“One official said the cyberbreach was one of Beijing’s most brazen cyber attacks against the United States,” the report said.

The law enforcement source was notified of the successful phishing incident but did not know what information was actually accessed. A White House official downplayed that report, saying that the system involved was not a sensitive nuclear system, and no evidence indicated that information was actually taken.

“In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place. Moreover, there was never any impact or attempted breach of any classified system,” he said.

The attempted hacking of U.S. military networks used by the White House is a common occurrence, but success is rare.

Due to the volume of these attempts on secure computers, law enforcement, military, and members of other agencies with access to those systems and other White House secure networks have strict rules about email and Internet usage, the law enforcement official explained.

Chinese hackers are often cited as the cause of such incidents, Ghosh said.

“Over the past 24 months, China has been aggressively targeting America’s corporations for their intellectual property and our government agencies and departments for critical national security information,” he said.

The incident underscores the real cyber security challenge today: people.

“The cyber security industry is woefully behind the curve in terms of protecting the network from spear-phishing attacks against employees,” Ghosh said. “Today, training is the primary solution to this problem … and training simply does not work.”

“The White House, every Fortune 1,000 and Global 2,000 organization — medium-sized business, small businesses, consumers — ALL are at risk from spear-phishing attacks.”

Technologies need to be developed to protect against such attacks, Ghosh said, and government and private companies will remain at risk until computer users are placed in some form of “protective bubble” when they encounter untrusted content.

America is on the losing end of an aggressive cyber conflict waged by nation states, organized cybercriminals and hacktivists, he said.

“We need to give this critical priority — it needs to be a discussion at every level of our government and we must rapidly adopt new technologies to protect our nation from this threat.”

Source: Business Insider

Political Conspiracies

Post navigation

Previous Post: Approaching Comet Set To Outshine The Moon Next Year
Next Post: Random Facts about the Universe

Related Posts

  • Spy versus….Everybody! Political Conspiracies
  • US Embassy Attack in Libya was “No Doubt” a Coordinated Attack to Celebrate 9/11 Political Conspiracies
  • Remember, The Federal Reserve Has Its OWN Police Powers Political Conspiracies
  • Word War II: New Mind Reading SurveillanceTechnology Declares War on Language Political Conspiracies
  • How Big Brother Will Wiretap Everyone With One Document in 2012 Political Conspiracies
  • Government FINALLY Gives in to 9/11 Cancer Link Political Conspiracies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The Meat Eater couple arrested for child abuse
  • The Meat-Eater boxer kidnapped and raped a young school Girl
  • Carnist man arrested for 198 years for raping and shooting a woman
  • Mitch McConnell- Eating Cow Corpses
  • Animal Flesh Eater Arrested: Felony Charges Serious Injury To 3 Month Old!

Recent Comments

No comments to show.

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • May 2020
  • June 2018
  • February 2018
  • July 2016
  • May 2016
  • February 2016
  • September 2015
  • July 2015
  • May 2015
  • April 2015
  • March 2015
  • January 2015
  • December 2014
  • November 2014
  • July 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003

Categories

  • Ancient Civilizations
  • Benjamin Fulford Story
  • Corrupt Carnivores
  • Cryptology and Monsters
  • Eating Healthy
  • Ghost And Demons
  • Information and Theories
  • Mars Coverage
  • Meditation And Spirituality
  • Mysteries
  • NASA Articles
  • Other Exciting News
  • Personal Accounts
  • Pictures And Multimedia
  • Political Conspiracies
  • Recent Submissions
  • Religion Articles
  • Self Improvement
  • Simply Unexplainable
  • Space and Astrology
  • Technology Articles
  • True Stories
  • UFOs and Aliens
  • Unexplainable Video Library
  • Unexplainable Weather
  • Superstitions Dealing With Creatures Information and Theories
  • Imagine Your Hand as a Touch Screen Computer Technology Articles
  • The Parthian Empire Ancient Civilizations
  • Indian Minerals for Natural Treatments Information and Theories
  • Artifacts that point to Aliens Visiting Earth UFOs and Aliens
  • The Case for Celestial Humans Part 1 UFOs and Aliens
  • 2 more strange things on Mars Sent By Thomas Jacobsen Simply Unexplainable
  • Renaissance Astronomer Profile: Copernicus (The Beginning) Space and Astrology

Copyright © 2023 Unexplainable.net.

Powered by PressBook News Dark theme