Cyber-Attack attacked the US military network

After the US Army Strategic Command issued a ban on the use of mobile communications devices in the US military network last week ...

After the US Army's Strategic Command issued a ban on the use of mobile communication devices in the US military network last week, there has been much new information so far about the events. is revealed to the outside.

The network of American control centers used to monitor the systems in Iraq and Afghanistan was completely paralyzed, while 75% of the computers of the main military system in Afghanistan were infected with a pest through external devices.

According to the US newsletter and other reports, cyber-attack attacks on the system in Afghanistan have originated in China, this is not the first time it has been used. This attack targets security information from military computers. If successful, it will copy all the information about military forces and previous operational information. But it is clear that not all of the information has leaked outside when this incident occurred.

Cyber-Attack attacked the US military network Picture 1Cyber-Attack attacked the US military network Picture 1

Photo: blog.wired.com

According to another source, this is not only data theft by Chinese hackers but it may be funded by Beijing headquarters or it may be that they work independently. This is a question that has not yet got an official answer, although this is not the first attack on the US government system that originated in China. Recently, a series of attacks have occurred, including the infiltration of US Pentagon computers, cyberattacks in the election campaign of Barack Obama and John McCain, and the attack. The network demands compromise with the American White House.

All intrusions to the security system have led to leaks of data to the outside, though it may not be important information. An American official said that China is famous for its information gathering technique called 'grain of sand', with huge information of low security data, they analyze and discover 'vital' information

At the same time, Los Angeles' regular report on a high risk to the US control center's network was hijacked by a computer worm. It was the seriousness of this incident that made US military leaders consider and send a report to President Bush for the incident, immediately warning that the high level of INFOCON was announced. INFOCON (Conditions for using system information) are laws to ensure computer safety is applied to DEFCON. And there are some informal reports that this attack comes from Russia.

Russia is no stranger to the "cyber war", which was demonstrated in 2007 when Russia successfully launched and completely paralyzed the Estonian government's network. This wave of Russian attacks led to more than 300 Lithunian websites lost and replaced by flying Soviet flag screens or Communist symbols. Recently, attacks from Russia have targeted Georgian government computers along with armed conflicts between the two countries.

Military officials expressed concern, because according to them, these attacks are not just random. Instead, the attack was built on special military computer systems. Attackers 'learned a lot after these attacks, such as how to face and work with different systems' - a US official warned.

5 ★ | 2 Vote