Amateur Radio Emergency Service - W4ACA

Proudly using the Oak Ridge ARC (W4SKH) Repeaters & W4ACA APRS Digipeater

Saturday, December 15, 2007

Black Hack Down: U.S. Military Labs Data Get Breached (ORNL)

December 12th, 2007 by Jake Soriano

Michael Jackson even had a song about it: Human Nature. There’s your weakest link—and one that hackers repeatedly take advantage of and manipulate.

Reports confirm that hackers have successfully broken the Oak Ridge National Laboratory (ORNL) in Tennessee, an institution in the United States that conducts highly sensitive research. While little is known of it, it also appears that the sister-institution of ORNL, the Los Alamos National Laboratory in New Mexico, was also hacked. These are two of the United States’ more important research labs, where homeland security and military researches are conducted.

Investigations reveal that seven (only seven) phishing emails were directly involved in the breach. The said email messages were sent to lab employees. It was still unclear what these messages did specifically, but experts say they probably had malicious attachments in them.

Waves of phishing emails reportedly began in October, with employees as specific targets. The attackers managed to access a non-classified computer of ORNL that contained the personal information of people who visited the research laboratory since 1990.

The targeted attacks on these two institutions and the success of the hackers had analysts calling them “a sophisticated cyber attack that now appears to be part of a coordinated attempt to gain access to computer networks at numerous laboratories and other institutions across the country.”

Analysts, though, are careful in naming explicit architects of the attack. The angles range from a government-sponsored espionage to the work of a small crime organization.

What is interesting is that this would not be the first attack of this kind on institutions like the abovementioned laboratories. Los Alamos, in fact, has been the subject of not just one, but several breaches in recent years.

At the center of all these security breaches and hacking attacks is the individual—one with a trusting, or non-questioning, nature. The lesson learned here is that a huge and imposing organization is still made of people, and when these people are not well informed on how to stave off potential security attacks, the whole organization suffers.

Courtesy of Trend Micro Malware Blog

No comments:

Anderson County ARES Information

The Anderson County ARES net meets every Tuesday Night at 7PM local time.
We use the the W4SKH Oak Ridge ARC repeaters.

The main repeater is: 146.880 PL Tone 88.5 (Currently Online)
The current back up is: 146.970 (Currently Online)

The ARES Nation Simplex Frequency is 147.420 and will used if required.

The net preamble for the Anderson County ARES net can be found here.
NET PREAMBLE

Net Control Station Manual

New FCC BAND PLAN (pdf) Updated Version with a different layout HF Band Plan Vertical (pdf) Courtesy of KB6NU's Ham Radio Blog

If you would like to join Anderson County ARES please complete the application form and submit it by email to Jeff or Moe.


Emergency Coordinator and Staff

Jeff Yawn K4IK Emergency Coordinator (865)567-2577
Jim Bogard - KY4L Assistant Emergency Coordinator
Larry Hensley - KB4ITS Asst Emergency Coordinator / Net Manager
Steve Lothridge - KI4RGN Net Manager
Moe Brewer - N4CQW Asst Emergency Coordinator / Webmaster

Trend Micro

QTH.com Classifieds