Page 3 of 5 FirstFirst 12345 LastLast
Results 21 to 30 of 46
  1. #21
    Elite Member noy.juan's Avatar
    Join Date
    Mar 2010
    Gender
    Male
    Posts
    1,521
    Blog Entries
    1

    Default Re: Hackers breach US military contractors' networks


    last 2008 Cyber attack on US defense network was the worst one, it was propagated thru infected USB Thumbdrive

    Under Worm Assault, Military Bans Disks, USB Drives | Danger Room | Wired.com
    Pentagon: All options on table in cyber-attack - Yahoo! News

    just like i said.... most cyber assault had insider to help the propagate the worm to command and control the targeted network..

  2. #22
    C.I.A. cliff_drew's Avatar
    Join Date
    Oct 2008
    Gender
    Male
    Posts
    4,571
    Blog Entries
    2

    Default Re: Hackers breach US military contractors' networks

    ^ The infected usb used by the insider is the culprit not the insider himself.

  3. #23
    Elite Member noy.juan's Avatar
    Join Date
    Mar 2010
    Gender
    Male
    Posts
    1,521
    Blog Entries
    1

    Default Re: Hackers breach US military contractors' networks

    Quote Originally Posted by cliff_drew View Post
    ^ The infected usb used by the insider is the culprit not the insider himself.
    but using it without cleaning it first can still make that person an indirect-accomplish, that person is still helping the hacker without its knowledge

    its called Social Engineering... some hacker do that to gain access or information....a deception to trick a person from indirectly helping the hacker...

    some may use coersion to force individual from helping them, usually they look for leverage that could coerce that person...

    anyways.... HACKING and SOCIAL ENGINEERING usually works together...

  4. #24

    Default Re: Hackers breach US military contractors' networks

    C= canada?

  5. #25
    C.I.A. cliff_drew's Avatar
    Join Date
    Oct 2008
    Gender
    Male
    Posts
    4,571
    Blog Entries
    2

    Default Re: Hackers breach US military contractors' networks

    Quote Originally Posted by noy.juan View Post
    but using it without cleaning it first can still make that person an indirect-accomplish, that person is still helping the hacker without its knowledge

    its called Social Engineering... some hacker do that to gain access or information....a deception to trick a person from indirectly helping the hacker...

    some may use coersion to force individual from helping them, usually they look for leverage that could coerce that person...

    anyways.... HACKING and SOCIAL ENGINEERING usually works together...
    This is what happened -- social engineering the usb way.

    It started when a USB flash drive infected by a foreign intelligence agency was left in the parking lot of a Department of Defense facility at a base in the Middle East. It contained malicious code and was put into a USB port from a laptop computer that was attached to United States Central Command.

    The cyber spent nearly 14 months cleaning the worm, named agent.btz, from military networks. Agent.btz, a variant of the SillyFDC worm, has the ability "to scan computers for data, open backdoors, and send through those backdoors to a remote command and control server."
    2008 cyberattack on United States - Wikipedia, the free encyclopedia



    Quote Originally Posted by anubiz View Post
    C= canada?
    Nope. Try harder.

  6. #26

    Default Re: Hackers breach US military contractors' networks

    hahahahahahaha in my opinion each either russia nor japan tingali pud nagsabwatan na cla naa cly tawo sa US government or called DPA stand for Deep Penetrating Agent to lead this to 3rd World War. Lol......

  7. #27

    Default Re: Hackers breach US military contractors' networks

    Dah... mga taw nana ni OBL. Using cyber attack as a retaliation for their leaders death. Probably the first phase of their plan. Get info on US defense systems first then go to the next phase...

  8. #28
    Elite Member noy.juan's Avatar
    Join Date
    Mar 2010
    Gender
    Male
    Posts
    1,521
    Blog Entries
    1

    Default Re: Hackers breach US military contractors' networks

    Quote Originally Posted by anubiz View Post
    C= canada?
    Peoples Republic of Cebu

  9. #29

    Default Re: Hackers breach US military contractors' networks

    unsaun kha ni nila pghack sa? grabi, mga genuis gyd ni cla.

  10. #30
    Elite Member noy.juan's Avatar
    Join Date
    Mar 2010
    Gender
    Male
    Posts
    1,521
    Blog Entries
    1

    Default Re: Hackers breach US military contractors' networks

    Quote Originally Posted by phil8s View Post
    unsaun kha ni nila pghack sa? grabi, mga genuis gyd ni cla.
    its not necessary to be a genius to become a hacker... all it takes is your familiar of the network you are going to attack...

    my office mate before sa innodata hacked the domain server by accident from within... shutting it down... stop gud a 3rd shift production for the whole shift... he didnt know what he did but he was able to gain access sa domain server...

  11.    Advertisement

Page 3 of 5 FirstFirst 12345 LastLast

Similar Threads

 
  1. For Sale: AUTHENTIC BDU's (US MILITARY)
    By okimura in forum Sporting Goods
    Replies: 86
    Last Post: 02-07-2013, 10:29 PM
  2. Replies: 0
    Last Post: 06-07-2012, 02:53 PM
  3. Replies: 12
    Last Post: 06-07-2009, 11:44 PM
  4. Replies: 4
    Last Post: 04-25-2008, 04:56 PM
  5. Replies: 0
    Last Post: 04-03-2008, 10:30 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
about us
We are the first Cebu Online Media.

iSTORYA.NET is Cebu's Biggest, Southern Philippines' Most Active, and the Philippines' Strongest Online Community!
follow us
#top