Energy News  
Analysis: U.S. labs under cyberattack

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington (UPI) Dec 11, 2007
A computer security breach at Oak Ridge National Laboratory, in which hackers stole a database of visitors' personal information, was a highly sophisticated cyberattack and part of a concerted effort to penetrate numerous U.S. labs and other scientific facilities.

Although the identity of the attackers remains unclear, security researchers have linked some Internet addresses recently used in similar attacks to computers in China.

In an e-mail message sent to staff last week, Oak Ridge Director Thom Mason said the breach "now appears to be part of a coordinated attempt to gain access to computer networks at numerous laboratories and other institutions across the country."

A spokesman for the Los Alamos National Laboratory told United Press International that "a very small number, single figures," of the lab's unclassified computers had been compromised in a "malicious, sophisticated hacking" attack last month.

"The investigation is continuing," said the spokesman, Kevin Roark. He declined to comment on whether the attack was linked to the one on Oak Ridge.

Mason said the Oak Ridge hackers made more than 1,000 attempts to steal data "with a very sophisticated strategy" involving the use of highly targeted so-called spear phishing emails, "all of which at first glance appeared legitimate."

Phishing e-mails classically purport to come from a bank or other financial institution of which the target is a customer. They tell the recipient to go to a Web page to "confirm" their login and password, but the link in the e-mail instead directs them to a hacker site where their information is used to break into their account and steal their money.

"Phishing attacks are very problematic" for information security professionals, former Energy Department cybersecurity chief Bruce Brody told UPI.

"They exploit the weakest link in the system, the user," Brody said. "If done with even a little sophistication, it is almost impossible to protect the entire population" of system users from such attacks.

Spear phishing attacks are even harder to defend against, because they combine such e-mails with so-called social engineering techniques -- using known information about the target to personalize the attacks. The embedded link or attachment will often install software on the target's computer that steals their logins and passwords for multiple sites or systems they use.

In the Oak Ridge attack, the hackers used seven different kinds of e-mail, Mason said. One purported to advise staff about a scientific conference organized by the Department of Defense, while another pretended to be notification of a complaint to the Federal Trade Commission.

"At present we believe that about 11 staff opened the attachments, which enabled the hackers to infiltrate the system and remove data," Mason wrote in the message. In a separate notice posted on its Web site the lab stated that the first breach occurred Oct. 29.

The notice said the data stolen included a database of visitors to the top-security site, which houses a nuclear research reactor and the lab that does scientific work on a number of national security issues for the Department of Energy.

The Web site of the lab, which is run by UT-Battelle LLC, under contract from the department, says 300,000 people visit every year.

"If you visited (the lab) between the years 1990 and 2004 your name and other personal information such as your social security number or date of birth may have been part of the stolen information," reads the notice, which advises visitors to monitor their credit records for possible identity theft or other fraud.

The message said there was no evidence that any of the information stolen had been used by hackers, and some observers were skeptical that the entire penetration had been devised simply to steal that kind of data.

"It could be a target of opportunity," said former Justice Department cybercrime chief Mark Rasch. "Once they (the hackers) were in there, they took whatever they could get."

On the other hand, he said, if the attack were from a foreign intelligence service, "It might be useful to know who had visited" a classified facility, if only as "a source of leads about who might have access to classified information."

Last month the U.S. Computer Emergency Readiness Team, an element of the Department of Homeland Security's infrastructure protection operation better known as U.S.-CERT, issued one of its periodic advisories to public and private sector computer network managers.

According to a Homeland Security official, the advisory alerted recipients to "a series of sophisticated attempt to compromise government and private networks and obtain access to secure systems �� and steal data."

"There was no information about the identity of the attackers" in the advisory, said the official.

However, the official said it listed 12 "signatures," which he described as a cyber "fingerprint �� which can be used to identify and track malicious activity on the network" -- such as an Internet address to which hacker software is sending stolen passwords or other information.

The attacks were similar in nature and sophistication, and most commonly used Trojan horse programs like those installed by the Oak Ridge hackers, but that did not necessarily mean they were linked, said the official.

One security researcher told The New York Times at the weekend that some of the Internet addresses listed by U.S.-CERT were linked to computers in China, but this does not mean the attackers were based there. China has one of the highest proportions of compromised or infected personal computers in the world, and such machines are easily used by hackers as proxies to launch anonymous attacks.

But the Chinese military has been fingered before as being behind such attacks, especially the so-called Titan Rain penetrations of top-security U.S. labs and other facilities.

National laboratories like Oak Ridge and Los Alamos "have historically been lucrative targets for foreign intelligence services," said Brody, the former cybersecurity official.

Roark, the Los Alamos spokesman, added that on a typical day the lab was subject to 50,000 attempted penetrations or other cyberattacks. "On a bad day, it will reach half a million," he said.

Community
Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Analysis: Global cyber-crime case cracked
Washington (UPI) Dec 4, 2007
The investigation of a relatively minor computer crash at the University of Pennsylvania last year led law enforcement agencies from three countries to a multimillion-dollar cyber-crime syndicate writing computer viruses to order and renting out networks of millions of compromised slave PCs to other online criminals.







  • Darfur rebels say they attacked Chinese-run oilfield in Sudan
  • Solar Energy To Power Pumping Station For Geothermal Plant
  • Recurrent Energy Closes 200 Million Dollar Staged Solar Project Fund With Morgan Stanley
  • Outside View: Russian oil, gas drying up?

  • France to supply nuclear reactors to Libya: presidency
  • Bulgaria hails EU green light for nuclear plant
  • IAEA chief to visit uranium enriching plant in Brazil
  • Investors covet Canadian nuclear energy market

  • New Model Revises Estimates Of Terrestrial Carbon Dioxide Uptake
  • A Breathable Earth
  • Researchers Find Origin Of Breathable Atmosphere Half A Billion Years Ago
  • Study Reveals Lakes A Major Source Of Prehistoric Methane

  • Niger's vanishing forests: last hope to keep desert at bay
  • 160-million-dollar plan to save forests launched at Bali talks
  • New Report On Deforestation Reveals Problems Of Forest Carbon Payment Schemes
  • Greenpeace urges summit to end Africa's deforestation

  • Researchers Build New Model Of Bio-Exploration In Central Asia
  • Building Disease-Beating Wheat
  • Analysis: Can agriculture save Africa
  • Food Source Threatened By Carbon Dioxide

  • Carmakers pledge support for Bali climate talks
  • Feeling Guilty Over Climate Change Then Call The Solar Taxi
  • France slaps penalties on gas-guzzling cars
  • V2G Car Generates Electricity And Cash

  • California urges regulation on aircraft emissions
  • Announcement Of Opportunity For Sounding Rocket And Balloon Flights
  • China to order up to 150 Airbus jets during Sarkozy visit: report
  • Time Magazine Recognizes The X-48B

  • Nuclear Power In Space - Part 2
  • Outside View: Nuclear future in space
  • Nuclear Power In Space
  • Could NASA Get To Pluto Faster? Space Expert Says Yes - By Thinking Nuclear

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement