Military PIN Number Stealing Virus Reportedly Hails from China
February 3, 2012 10:23 AM
comment(s) - last by
Virus attempts to gain access to DOD computer systems
Hackers are becoming more and more common while the stakes for corporations and governments continually increase. Hackers are able to steal valuable information that can be sold or used against the companies they steal from. Other times hackers are simply out to cause damage to systems. According to reports, military service members are getting e-mails that appear to be formal with official looking PDFs attached that contain a virus.
When the service personnel open the PDF attachment a key logger is installed that is attempting to steal the PIN numbers that people use for accessing their Common Access Card. The Common Access Card is a smartcard that personnel used to access government computer systems. Reports also claim that once the software is installed, the hacker can access the government computer and manipulate the computer anyway they want while soldier is using their own PC.
Security firm Alien Vault's lab manager Jamie Blasco claims that the source of the cyber attack against military personnel originates in China. Blasco came to this conclusion during his investigation when he found that some of the code in the malware contains Chinese characters. Blasco also claims that during the tracing of the attack the security company found software that is used solely in China. However, the security firm can't be 100% certain that China is the source.
The Department of Defense is allegedly is aware of the Sykipot virus and Blasco claims that he has discussed the malware with security specialists working for the government. The virus attacks any technology that the Common Access Card system used by the Pentagon supports. Users of that system should keep an eye out for e-mails that appear to be official and have attachments.
Apparently some of the e-mails containing the virus-infected attachment have claimed to have information regarding a newly introduced drone along with pictures a robot said to be called aircrafts. The virus has the ability to access government computers only as long as the infected user's card is active on their personal computer system.
This article is over a month old, voting and posting comments is disabled
RE: proof read much?
2/3/2012 12:23:25 PM
arstechnica probably has about 60-70% overlapping stories, and actually have editors read the articles before they are published. I don't expect articles to be 100% all the time, but dailytech articles are never proof read (or if they are, the editor needs to be fired).
I don't expect writers to get everything correct, but it is almost like they write it and hit publish, having never read what they just wrote.
"Game reviewers fought each other to write the most glowing coverage possible for the powerhouse Sony, MS systems. Reviewers flipped coins to see who would review the Nintendo Wii. The losers got stuck with the job." -- Andy Marken
Creationists are Mad About Google Doodle Depicting Evolution
November 24, 2015, 8:48 PM
DHS and TSA: Whoops, We Missed That 73 Airport Employees May be Terrorists
November 19, 2015, 2:16 PM
Star Wars Spinoff Film "Rogue One", Theme Park Attractions Announced
August 17, 2015, 12:20 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
Cool Science Video: Glowing Millipede Prowls the Nevada Desert
May 18, 2015, 12:00 PM
Newly Discovered Costa Rican Glass Frog is Kermit's Doppelgänger
April 22, 2015, 11:26 AM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information