Military PIN Number Stealing Virus Reportedly Hails from China
February 3, 2012 10:23 AM
comment(s) - last by
Virus attempts to gain access to DOD computer systems
Hackers are becoming more and more common while the stakes for corporations and governments continually increase. Hackers are able to steal valuable information that can be sold or used against the companies they steal from. Other times hackers are simply out to cause damage to systems. According to reports, military service members are getting e-mails that appear to be formal with official looking PDFs attached that contain a virus.
When the service personnel open the PDF attachment a key logger is installed that is attempting to steal the PIN numbers that people use for accessing their Common Access Card. The Common Access Card is a smartcard that personnel used to access government computer systems. Reports also claim that once the software is installed, the hacker can access the government computer and manipulate the computer anyway they want while soldier is using their own PC.
Security firm Alien Vault's lab manager Jamie Blasco claims that the source of the cyber attack against military personnel originates in China. Blasco came to this conclusion during his investigation when he found that some of the code in the malware contains Chinese characters. Blasco also claims that during the tracing of the attack the security company found software that is used solely in China. However, the security firm can't be 100% certain that China is the source.
The Department of Defense is allegedly is aware of the Sykipot virus and Blasco claims that he has discussed the malware with security specialists working for the government. The virus attacks any technology that the Common Access Card system used by the Pentagon supports. Users of that system should keep an eye out for e-mails that appear to be official and have attachments.
Apparently some of the e-mails containing the virus-infected attachment have claimed to have information regarding a newly introduced drone along with pictures a robot said to be called aircrafts. The virus has the ability to access government computers only as long as the infected user's card is active on their personal computer system.
This article is over a month old, voting and posting comments is disabled
RE: proof read much?
2/3/2012 4:15:58 PM
Oh and if you are going to bust on me about things like the word "grammatical", perhaps you should spell it correctly when you do. ;)
"Vista runs on Atom ... It's just no one uses it". -- Intel CEO Paul Otellini
Nail Polish May Soon be Able to Detect Date Rape Drugs
August 26, 2014, 7:57 AM
SpaceX Falcon 9-R Rocket Suffers Malfunction, Self-Destructs During Test Flight
August 23, 2014, 9:36 AM
Texas Chosen as Site for SpaceX's First Commercial Launchpad
August 5, 2014, 1:44 PM
South Carolina Prison Finds Crashed Drone Carrying Drugs, Phones
August 1, 2014, 2:49 PM
NASA's Mars 2020 Rover Gains Seven New Instruments for Exploration
August 1, 2014, 1:30 PM
NASA Opportunity Rover Breaks Record for Most Miles Traveled on Another Planet
July 29, 2014, 1:38 PM
Most Popular Articles
Apple Announces Its Smartwatch: The $349 Apple Watch
September 9, 2014, 2:09 PM
Quick Note: Buy an Xbox One Sept 7-13, Get a Free Game
September 4, 2014, 10:42 AM
Apple Announces 4.7" iPhone 6, 5.5" iPhone 6 Plus
September 9, 2014, 1:45 PM
T-Mobile Launches Un-carrier 7.0, Beefs Up Wi-Fi Calling
September 11, 2014, 2:56 PM
HTC Preps Nexus 9 With Nvidia K1 64-Bit "Denver" SoC, Android L Onboard
September 10, 2014, 10:21 PM
Latest Blog Posts
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information