Russian News  
Analysis: U.S. labs under cyberattack

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Dec 11, 2007
A computer security breach at Oak Ridge National Laboratory, in which hackers stole a database of visitors' personal information, was a highly sophisticated cyberattack and part of a concerted effort to penetrate numerous U.S. labs and other scientific facilities.

Although the identity of the attackers remains unclear, security researchers have linked some Internet addresses recently used in similar attacks to computers in China.

In an e-mail message sent to staff last week, Oak Ridge Director Thom Mason said the breach "now appears to be part of a coordinated attempt to gain access to computer networks at numerous laboratories and other institutions across the country."

A spokesman for the Los Alamos National Laboratory told United Press International that "a very small number, single figures," of the lab's unclassified computers had been compromised in a "malicious, sophisticated hacking" attack last month.

"The investigation is continuing," said the spokesman, Kevin Roark. He declined to comment on whether the attack was linked to the one on Oak Ridge.

Mason said the Oak Ridge hackers made more than 1,000 attempts to steal data "with a very sophisticated strategy" involving the use of highly targeted so-called spear phishing emails, "all of which at first glance appeared legitimate."

Phishing e-mails classically purport to come from a bank or other financial institution of which the target is a customer. They tell the recipient to go to a Web page to "confirm" their login and password, but the link in the e-mail instead directs them to a hacker site where their information is used to break into their account and steal their money.

"Phishing attacks are very problematic" for information security professionals, former Energy Department cybersecurity chief Bruce Brody told UPI.

"They exploit the weakest link in the system, the user," Brody said. "If done with even a little sophistication, it is almost impossible to protect the entire population" of system users from such attacks.

Spear phishing attacks are even harder to defend against, because they combine such e-mails with so-called social engineering techniques -- using known information about the target to personalize the attacks. The embedded link or attachment will often install software on the target's computer that steals their logins and passwords for multiple sites or systems they use.

In the Oak Ridge attack, the hackers used seven different kinds of e-mail, Mason said. One purported to advise staff about a scientific conference organized by the Department of Defense, while another pretended to be notification of a complaint to the Federal Trade Commission.

"At present we believe that about 11 staff opened the attachments, which enabled the hackers to infiltrate the system and remove data," Mason wrote in the message. In a separate notice posted on its Web site the lab stated that the first breach occurred Oct. 29.

The notice said the data stolen included a database of visitors to the top-security site, which houses a nuclear research reactor and the lab that does scientific work on a number of national security issues for the Department of Energy.

The Web site of the lab, which is run by UT-Battelle LLC, under contract from the department, says 300,000 people visit every year.

"If you visited (the lab) between the years 1990 and 2004 your name and other personal information such as your social security number or date of birth may have been part of the stolen information," reads the notice, which advises visitors to monitor their credit records for possible identity theft or other fraud.

The message said there was no evidence that any of the information stolen had been used by hackers, and some observers were skeptical that the entire penetration had been devised simply to steal that kind of data.

"It could be a target of opportunity," said former Justice Department cybercrime chief Mark Rasch. "Once they (the hackers) were in there, they took whatever they could get."

On the other hand, he said, if the attack were from a foreign intelligence service, "It might be useful to know who had visited" a classified facility, if only as "a source of leads about who might have access to classified information."

Last month the U.S. Computer Emergency Readiness Team, an element of the Department of Homeland Security's infrastructure protection operation better known as U.S.-CERT, issued one of its periodic advisories to public and private sector computer network managers.

According to a Homeland Security official, the advisory alerted recipients to "a series of sophisticated attempt to compromise government and private networks and obtain access to secure systems �� and steal data."

"There was no information about the identity of the attackers" in the advisory, said the official.

However, the official said it listed 12 "signatures," which he described as a cyber "fingerprint �� which can be used to identify and track malicious activity on the network" -- such as an Internet address to which hacker software is sending stolen passwords or other information.

The attacks were similar in nature and sophistication, and most commonly used Trojan horse programs like those installed by the Oak Ridge hackers, but that did not necessarily mean they were linked, said the official.

One security researcher told The New York Times at the weekend that some of the Internet addresses listed by U.S.-CERT were linked to computers in China, but this does not mean the attackers were based there. China has one of the highest proportions of compromised or infected personal computers in the world, and such machines are easily used by hackers as proxies to launch anonymous attacks.

But the Chinese military has been fingered before as being behind such attacks, especially the so-called Titan Rain penetrations of top-security U.S. labs and other facilities.

National laboratories like Oak Ridge and Los Alamos "have historically been lucrative targets for foreign intelligence services," said Brody, the former cybersecurity official.

Roark, the Los Alamos spokesman, added that on a typical day the lab was subject to 50,000 attempted penetrations or other cyberattacks. "On a bad day, it will reach half a million," he said.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Analysis: Global cyber-crime case cracked
Washington (UPI) Dec 4, 2007
The investigation of a relatively minor computer crash at the University of Pennsylvania last year led law enforcement agencies from three countries to a multimillion-dollar cyber-crime syndicate writing computer viruses to order and renting out networks of millions of compromised slave PCs to other online criminals.







  • Political power and economic wealth go together in China: researcher
  • Behind the Kitty Hawk spat
  • OSCE presidency urges Russia to reconsider arms treaty move
  • Euro Thaw Not What It Seems

  • Iran's Ahmadinejad: US report positive step
  • Iran restarted nuclear weapons program in 2004: dissident
  • Ahmadinejad says US Iran report positive step
  • Ahmadinejad slammed for 'letter-writing' foreign policy

  • Process On For Establishing Aerospace Command
  • Cisco plans to turn India into global hub, triple workforce

  • China resists binding curbs on climate-change emissions
  • Youth crime in China explodes as social values decline: report
  • Chinese archaeologists dig up 4,000-year-old city
  • Workers in China strike over rising food costs: officials

  • Darfur rebels say they attacked Chinese-run oilfield in Sudan
  • Solar Energy To Power Pumping Station For Geothermal Plant
  • Recurrent Energy Closes 200 Million Dollar Staged Solar Project Fund With Morgan Stanley
  • Outside View: Russian oil, gas drying up?

  • Columbus Launch Now No Earlier Than 2nd January
  • New space mission aims to broaden Europe's ISS role
  • The European Columbus Space Laboratory Set To Reach ISS
  • Jules Verne ATV Given Its Wings

  • Northrop Grumman Develops World's Fastest Transistor To Support Military's Need For Higher Frequency And Bandwidth
  • Russia launches military satellite: agencies
  • Harris Tests New Falcon III Multiband Manpack Radio During US Army Patriot Missile Exercise
  • SKorea develops military communication system: officials

  • Thompson Files: USAF airlift options
  • Raytheon To Provide Surveillance Systems To NATO
  • Lockheed Martin F-35 Marks 20th Flight
  • Outside View: Russia's super sea bombers

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement