[R-390] off topic interesting read
William J. Neill
wjneill at consolidated.net
Wed Apr 8 15:36:23 EDT 2009
The subject has attracted attn from DoD and DHS and herewith are a
sampling of comments from this morning's postings on a DoD INTEL
netserver:
We have known about China and Russia’s exploits on the NIPR front.
This article is interesting
in the fact that critical infrastructure systems were penetrated and
malware was left behind.
Does anyone have an UNCLASS damage assessment?
http://online.wsj.com/article/SB123914805204099085.html
On Apr 8, 2009, at 9:54 AM, Villano, Paul Mr CIV USA TRADOC wrote:
I found the CBS version of the story http://www.cbsnews.com/stories/
2009/04/08/national/main4928223.shtml
interesting because a former HLS employee mentions there were "a lot"
of intrusions last year. I wonder what the reason for his "former"
status is.
On Apr 8, 2009, at 8:51 AM, Raines, James B Jr WO1 RES USAR USARC wrote:
> We have known about China and Russia’s exploits on the NIPR front.
> This article is interesting
> in the fact that critical infrastructure systems were penetrated
> and malware was left behind.
>
> Does anyone have an UNCLAS damage assessment?
You may be interested in the Task Force on Electric Grid
Vulnerability (EGV), which maintains a host of unclassified and FOUO
materials on Intelink-U:
http://www.intelink.gov/wiki/Electric_Grid_Vulnerability
Membership and POCs available here:
http://www.intelink.gov/wiki/Electric_Grid_Vulnerability/Membership
You may wish to contact the Task Force for additional information on
the recent media coverage.
One important consideration is that the presence of malware on such
systems does not always imply intentional penetration; often, the
presence of malware on secure systems is the result of improper use,
poor user education, or other deficient local security practices. Web
and email vectors are common.
That said, the presence of this type of malware, much of which is
designed to communicate with an external control server for
instructions, is undesirable even if not the result of a concerted or
targeted effort. Once in place, networks of individuals interested in
more malicious activities than sending spam or bringing down a web
site would have a considerable base of systems from which to pick, in
all manner of sensitive areas.
- Dave
Bill Neill
Conroe, Texas
On Apr 8, 2009, at 11:47 AM, odyslim at comcast.net wrote:
I know this is off topic but worth reading. Individuals have been caught
trying to map out our power grids.
http://www.comcast.net/articles/news-general/20090408/NEWS-US-
CYBERATTACK-USA/
Regards, Scott
More information about the R-390
mailing list