BreachExchange mailing list archives
Anon steals a bunch of data from NASA, threatens to release it
From: Inga Goddijn <inga () riskbasedsecurity com>
Date: Wed, 3 Feb 2016 13:02:22 -0600
http://www.itproportal.com/2016/02/03/anon-steals-a-bunch-of-data-from-nasa-threatens-to-release-it/ Hacktivist group Anonymous recently breached NASA, stealing somewhere between 100 and 276GB of data, the In <http://icitech.org/>stitute for Critical Infrastructure Technology <http://icitech.org/> says. The data was stolen from NASA’s servers and drones, and include drone video and radar footage, flight logs and employee information. Anonymous claims NASA is not telling the truth about global warming – it wants the agency to disclose the ‘actual’ amount of radioactive chemicals in the upper atmosphere, and threatens to release the data unless NASA complies within a month. The group targeted specific data – drone footage in particular, as it contains records of chemical samples from the upper atmosphere. The stolen data was allegedly already given to WikiLeaks and The Guardian. No word from NASA or the FBI at this point. No one really knows how Anonymous managed to find their way inside NASA. There have been speculations that the group managed to buy its way in – purchasing its foothold from someone within the agency. They might have even bruteforced their way in – the group claims to have used a sniffing program to steal a system administrator password. The group split in two, with one part targeting NASA’s systems and stealing data, while the other was sniffing through it. Anonymous says it spent months inside the system and deleted all indicators of ever being present on the network. James Scott, Co-Founder of the Institute for Critical Infrastructure Technology finds it hard to believe that NASA couldn’t have defended against this attack. “First, it’s hard to believe that NASA hasn’t made use of a virtually unlimited budget to allocate funds to create the most technologically sophisticated cyber-barricade around their techno-infrastructure,” he says. “If this breach claim is indeed accurate, a few things that could have thwarted or substantially slowed down the breach would be: - User behavioural analytics: an early warning mechanism to detect abnormalities in user behaviour - User behavioural biometrics: another early warning mechanism most valuable when used with UBA to detect physical abnormalities in user’s technical behaviour - Multi layered field encryption of data in transit and stationary: name, email, phone etc. should each possess individual and unique encryption algorithms so that if the adversary breaches the network and goes undetected and is able to exfiltrate information, they have to literally decrypt each field. - Ongoing penetration testing: red team penetration testing by highly skilled hired-hackers to uncover vulnerabilities in the organization’s network and IoT attached devices. - Insider threat analysis: people who work at federal agencies with access to highly classified material must undergo ongoing direct and indirect psychological and lifestyle assessments to see if they are a current threat or could become a future threat. Credit profile, marital and familial relationships, financial stress, and professional satisfaction etc., all play a role in assessing the potential threat that comes from inside an organization. A certain level of privacy will need to be interrupted for federal employees with high level clearances as the IoT attach surface expands. - Consider each network, device, drone, NASA location vulnerable and breached until proven otherwise by penetration testing and vulnerability assessment/risk analysis. These simulations should take into consideration all know threat actors, vulnerabilities and exploits. - Change administration credentials from ‘default’ to creative combination of 16 randomized numbers, letters, upper and lower case (it is ‘claimed, that the adversary was able to brute force admin credentials in .32 seconds because the credentials were set as “default”).”
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Need access to data breach details or alerts when new breaches happen? Risk Based Security's Cyber Risk Analytics portal, fueled by the RBS breach research team, provides detailed information on how data breaches occur and which vendors to trust. Contact us today for a demo.
Current thread:
- Anon steals a bunch of data from NASA, threatens to release it Inga Goddijn (Feb 04)