White House Military Office breached by Chinese hackers
Posted on 01 October 2012.
Bookmark and Share
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and cyber espionage attempts that can be traced back to China, the news that the (probably) same attackers targeted the White House military office network shouldn't come as a surprise.


According to unnamed sources, the attackers managed to get into one of the U.S. government’s most sensitive computer networks, but it seems that protective measures allowed the breach to be quickly detected and blocked.

The White House Military Office (WHMO) "provides military support for White House functions, including food service, Presidential transportation, medical support and emergency medical services, and hospitality services," but also "oversees policy related to WHMO functions and Department of Defense assets" and "all military operations aboard Air Force One on Presidential missions worldwide," which includes communication with intelligence and military officials, as well as the communication of potential strategic nuclear commands.

The attack took place earlier last month, and came in the form of a spear phishing email to a White House employee.

"In this instance the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place,” the unnamed official told the WFB.

Needless to say, a successful breach of this network would cause considerable strategic damage to the United States.

The attack has been traced back to Chinese servers, and officials believe that a group of Chinese cyber warfare specialists lead by a unit of the People’s Liberation Army might be behind it.

There's also speculations that the attack was due to the recent maritime dispute between Japan and China over a group of Japanese islands that the Chinese say belong to them. The fact that the U.S. has a defense treaty in place with Japan and has moved some of its Marine military units near the aforementioned islands might have triggered China's decision to target the WHMO.






Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //