设计世界

  • Home
  • 技术
    • 3D CAD
    • Electronics • electrical
    • 固定和加入
    • Factory automation
    • Linear Motion
    • Motion Control
    • 测试和测量
    • Sensors
    • 流体功率
  • 学
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC²运动控制教室
    • 播客
    • Videos
    • 网络研讨会
  • 跳跃奖
  • 领导
    • 2022年投票
    • 2021获奖者
  • 设计指南库
  • 资源
    • 3D CAD型号
      • PARTsolutions
      • TraceParts
    • 数字问题
      • 设计世界
      • EE World
    • 工程领域的妇女
  • 供应商清单

错过的机会阻止OPM网络漏洞被阐明

经过埃里克·塔克(Eric Tucker),美联社|2016年9月7日

分享

是时候从美国政府的计算机中清除黑客了。在秘密监视黑客的在线运动数月之后,官员们担心他离关键信息太近了,并制定了一个被称为“大爆炸”的计划,以驱逐他。

麻烦的是,他们所有的注意力都集中在这种情况下,他们完全错过了其他黑客。

A new congressional report provides previously undisclosed details and a behind-the-scenes chronology of one of the worst-ever cyberattacks on the United States, laying out missed opportunities before the break-in at the Office of Personnel Management exposed security clearances, background checks and fingerprint records. That attack — widely blamed on China’s government — compromised personal information of more than 21 million current, former and prospective federal employees, led to the resignation of the OPM director and drew outrage over changing explanations about the hack’s seriousness.

众议院监督和政府改革委员会的报告使人事机构犯下了未能确保敏感数据的责备,尽管多年来警告说这很容易受到黑客的影响。它得出的结论是,如果OPM建立了基本,要求安全控制并从较早的闯入中认识到,去年揭示的黑客可能会被阻止,并从较早的闯入中认识到它实际上是在处理一个持久的,坚持不懈的敌人。

犹他州共和党人兼委员会主席众议员贾森·查菲茨(Jason Chaffetz)在接受采访时说:“我们实际上有数千万美国人的数据被邪恶的海外演员偷走了,但这是完全可以预防的。”

“With some basic hygiene, some good tools, an awareness and some talent, they really could have prevented this,” he added.

OPM代理总监贝丝·科伯特(Beth Cobert)在一份声明中说,该机构不同意该报告的大部分内容,“并不能完全反映该机构今天的位置”。她说,OPM黑客“为我们组织内部加速变化提供了催化剂,包括雇用新的网络安全专家并加强其安全性。

政府发现了2014年3月的第一次OPM黑客攻击,当时一个专业的国土安全部团队注意到可疑数据流在晚上10点之间留下其网络。和上午10点 - 在线搬运档案柜的在线卡车在深夜拖走了包含机密文件的档案柜。政府所谓的爱因斯坦入侵警告系统检测到了盗窃案。

“DHS called us and let us know, hey, we think this is bad,” Jeff Wagner, OPM’s director of information security operations, told officials investigating the hack, according to the hack.

For two months, the personnel office worked with the FBI, National Security Agency and others to monitor the hacker to better understand his movements. Officials developed a plan to expel the hacker over a three-day weekend in May 2014, dubbed “the Big Bang.” The effort included resetting administrative accounts, building new accounts for users who had been compromised and taking offline compromised systems.

“The risk of kicking them out too early had come and gone,” Wagner said, “and now the risk was becoming having them in too long, and we didn’t want to keep them around any longer than we had to.”

The problem was far from solved.

Unknown to the experts focused on expelling the hacker, a second intruder posing as an employee of a federal contractor had infiltrated the system weeks before “the Big Bang.” That hacker used a contractor’s credentials to log into the system, install malicious software and create a backdoor to the network, according to the report.

在接下来的几个月中,黑客偷走了敏感的安全清除背景调查文件,人员文件以及最终,指纹数据。

That breach was not detected until April 2015, when an OPM contract employee traced the flow of stolen material back to an Internet address that had been registered to Steve Rogers, the alter ego of Captain America, indicating a spoof account. By then, sensitive information on millions of American workers had already been compromised.

The report also faulted the personnel office for failing to quickly deploy security tools from an outside firm to detect malicious code and other threats. Once deployed, the tool from Cylance Inc. of Irvine, California, “lit up like a Christmas tree,” indicating it found malware throughout the federal computers, an engineer is quoted as saying in the report.

“Could they have done better? Absolutely,” said Cylance founder and chief executive Stuart McClure. “But once they had been definitively convinced there was a breach, they took it very seriously.”

它说,OPM官员误导了公众关于违规的范围,并且还说这两种违规行为无关,而是“他们似乎是联系并可能协调的”。

报告说:“两名攻击者共享了相同的目标,以类似的复杂方式进行了攻击,并以相似的时间打击。”

Though the U.S. suspects the hack was an act of Chinese espionage, the House inquiry did not go into great detail about who was responsible. It mentions that the data breaches discovered in April 2015 were likely perpetrated by the group “Deep Panda,” which has been linked to the Chinese military.


提交以下:Industry regulations


Related Articles阅读更多>

ids-industrial-camera-manufacturer.sustainability-3
IDS专注于运输的可持续性
第5部分:运动控制 + MQTT,OPC-UA和其他用于云服务的协议
Facebook首席执行官Zuckerberg要求更多外部法规
德国要求5G网络的供应商“值得信赖”

设计指南库

“运动

Enews Sign Up

运动控制教室

设计世界Digital Edition

覆盖

浏览最新的问题of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

电子电子论坛

全球问题解决EE论坛涵盖微控制器,DSP,网络,模拟和数字设计,RF,Power Electronics,PCB路由等等

Edaboard:电子论坛

Sponsored Content

  • 指定阀歧管的10个原因
  • Case study: How a 3D-printed tool saved thousands of hours and dollars
  • Wago的SmartDesigner Online为项目提供了无缝的进步
  • 停止过度设计:如何用轻度戒指节省时间和金钱
  • Five Reasons: The 2065 Connector is a Reliable Alternative to Manual Soldering
  • Disaster recovery in industrial automation starts with source control

设计世界播客

March 14, 2022
在航空航天应用中,如何“取下手铐脱离设计”
See More >
工程交换

工程交流是一个针对工程师的全球教育网络社区。

Connect, share, and learn today »

设计世界
  • Advertising
  • 关于我们
  • 接触
  • Manage your Design World Subscription
  • 订阅
  • 设计世界数字网络
  • 工程白皮书
  • 跳跃奖

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
隐私政策|Advertising|关于我们

搜索设计世界

  • Home
  • 技术
    • 3D CAD
    • Electronics • electrical
    • 固定和加入
    • Factory automation
    • Linear Motion
    • Motion Control
    • 测试和测量
    • Sensors
    • 流体功率
  • 学
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC²运动控制教室
    • 播客
    • Videos
    • 网络研讨会
  • 跳跃奖
  • 领导
    • 2022年投票
    • 2021获奖者
  • 设计指南库
  • 资源
    • 3D CAD型号
      • PARTsolutions
      • TraceParts
    • 数字问题
      • 设计世界
      • EE World
    • 工程领域的妇女
  • 供应商清单
我们使用Cookie来个性化内容和广告,提供社交媒体功能并分析我们的流量。我们还与社交媒体,广告和分析合作伙伴共享有关您使用我们网站的信息,他们可能将其与您提供给他们的其他信息或他们从使用他们的服务中收集的其他信息。如果您继续使用此网站,则同意我们的cookie。 好的NoRead more