Cyber-Attack attacked the US military network
After the US Army Strategic Command issued a ban on the use of mobile communications devices in the US military network last week ...
After the US Army's Strategic Command issued a ban on the use of mobile communication devices in the US military network last week, there has been much new information so far about the events. is revealed to the outside.
The network of American control centers used to monitor the systems in Iraq and Afghanistan was completely paralyzed, while 75% of the computers of the main military system in Afghanistan were infected with a pest through external devices.
According to the US newsletter and other reports, cyber-attack attacks on the system in Afghanistan have originated in China, this is not the first time it has been used. This attack targets security information from military computers. If successful, it will copy all the information about military forces and previous operational information. But it is clear that not all of the information has leaked outside when this incident occurred.
Photo: blog.wired.com
According to another source, this is not only data theft by Chinese hackers but it may be funded by Beijing headquarters or it may be that they work independently. This is a question that has not yet got an official answer, although this is not the first attack on the US government system that originated in China. Recently, a series of attacks have occurred, including the infiltration of US Pentagon computers, cyberattacks in the election campaign of Barack Obama and John McCain, and the attack. The network demands compromise with the American White House.
All intrusions to the security system have led to leaks of data to the outside, though it may not be important information. An American official said that China is famous for its information gathering technique called 'grain of sand', with huge information of low security data, they analyze and discover 'vital' information
At the same time, Los Angeles' regular report on a high risk to the US control center's network was hijacked by a computer worm. It was the seriousness of this incident that made US military leaders consider and send a report to President Bush for the incident, immediately warning that the high level of INFOCON was announced. INFOCON (Conditions for using system information) are laws to ensure computer safety is applied to DEFCON. And there are some informal reports that this attack comes from Russia.
Russia is no stranger to the "cyber war", which was demonstrated in 2007 when Russia successfully launched and completely paralyzed the Estonian government's network. This wave of Russian attacks led to more than 300 Lithunian websites lost and replaced by flying Soviet flag screens or Communist symbols. Recently, attacks from Russia have targeted Georgian government computers along with armed conflicts between the two countries.
Military officials expressed concern, because according to them, these attacks are not just random. Instead, the attack was built on special military computer systems. Attackers 'learned a lot after these attacks, such as how to face and work with different systems' - a US official warned.
You should read it
- What do you know about the first 'cyber attack' in the world?
- NVIDIA suffered a cyber attack, massive damage estimated
- Top 10 brilliant hackers
- The US was prosecuted after the virus attack on Iran
- Facebook is a new trend in cyber attacks
- Filipino hackers attack the Vietnamese web, retaliating that many users' Facebook accounts are 'hacked' by Vietnamese people
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is 51% attack? How does 51% attack work?
- What to do when detecting hackers attack websites?
- Next year will allow white hat hackers to attack Vietnam's No. 1 safety systems
- Phishing attack: The most common techniques used to attack your PC