Windows USB Vulnerabilities Reign Supreme

Saturday, August 28, 2010

Danny Lieberman

959779642e6e758563e80b5d83150a9f

In an article published Wednesday August 26, 2010 that discussed the Pentagon’s cyberstrategy, Deputy Defense Secretary William J. Lynn III revealed malicious code was placed on a removable drive by a foreign intelligence agency in 2008 and uploaded itself onto a network run by the U.S. military’s Central Command. – source: Washington Post:

“That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control,” he says in the Foreign Affairs article.

"It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary."

"Lynn's decision to declassify an incident that Defense officials had kept secret reflects the Pentagon's desire to raise congressional and public concern over the threats facing U.S. computer systems, experts said. "

Why doesn’t the US military just junk Windows and use Ubuntu? You can plug a USB with some autorun code to run Conficker on Ubuntu and precisely nothing will happen...

Cross-postedfrom Israeli Software

Possibly Related Articles:
11384
Viruses & Malware
Military
malware Windows
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.