Free Essay

Russian Hackers Attack the White House

In:

Submitted By darksage008
Words 891
Pages 4
| Russian hackers attack the white house | | | Michae haven | 4/27/2015 |

|

On April 8, 2015 CNN did a report on a security breach involving the white house and the state department. This attack was done allegedly by Russian hackers in an attempt to gain states secrets. The hackers had gained access to the state departments computers via a phishing email attack. The attack was found out by suspicious activity that was happening on the white house computers. This attack allowed them full access to the state department’s computers and eventually they were able to convince someone to give them access to the white house’s non classified systems where sensitive information like the presidents non-published schedule and other information. The state department had been battling the hackers for months on trying to keep the hackers out but with no success at doing so. The systems were taken off line in an attempt to purge the mal-ware that was installed that gave the access to the systems and for new security measures to be put into place to help prevent future attacks on the systems. (Prokupecz, 2015)
The attack was done by using a phishing scam. The way this works is first someone sends a message to a user, in this case it was by an email, trying to convince the user that they are someone from inside their work place, representing an event from the work place, or represents themselves as a trusted source. They then get the user to click on a web link that takes them to a fake website. Once at the site the hacker then downloads a malware virus that does several things. The first it can record information that is inputted or stored on the system like user names and passwords to bank account records. The second this malware can install a back door to the system giving the hacker access to the system as if they were an admin on the network. The third is they could ask the user to input information into the webs site that would then be recorded for future use. This could be a new user name and password to personal information about the user. The hacker then will use this information that is gathered to either launch attack against the network, build fake profiles for identity theft, or sell the information to people who want to attack the network or launch identity theft on the person. In this case the phishing that was launch gave access to the state department computers and white house computers.
The white house in response to the attack shut down their system that was affected and also shut down the state departments systems that was effected while they removed the malware that was in their system and upgraded their security of the current system to prevent phishing attacks from happening again.
Though that will not be enough to stop these sort of attacks from happening again against the white house and other government facilities. The reason for this is that the malware that is installed is seen as a trusted piece of software that comes from a trust site and thus by passes most anti-virus software. First extra training should be given to all employees on how to spot phishing scams and attacks. Second set spam filters high enough to catch junk mail or to see phishing attacks as junk mail and train employees not to open attachments from mail in the spam box and not to click on links in the spam box as they can lead to websites with malware that can infect the system. Train personal not to communicate personal information over the internet but by phone or on secure website. Also by training personal what secure websites look like they can know what sites to trust and what sites not to trust. Training to never email personal information no matter who you are emailing them to as they can fall into the wrong hands and lead to attacks of identity or attacks on their place of work. Train people to beware of pop ups and to never enter personal information into pop ups, don’t click on pop up adds as they can take them to unsecure sites that would do damage to them or the systems they work on. Increasing firewall, anti-virus and anti-spyware software also would help in protecting the network and prevent phishing scams from being launch successfully. Regular checks of the system for anomalies, suspicions activity, or unauthorized access has been made on the systems. (killer, 2008)
White House officials state that the attack on the white house and state department proves that we are not fully prepared for internet based attacks and that more needs to be done to protect how data infrastructure. In this case extra training, higher levels of anti-virus, anti-spyware, firewall protections and spam-filters could have prevented the attack on the white house and the state department.

Works Cited killer, i. t. (2008). are you phishing for trouble. Retrieved from identity theft killer: http://www.identitytheftkiller.com/prevent-phishing-scams.php
Prokupecz, E. P. (2015, 04 08). How the U.S. thinks Russians hacked the White House. Retrieved from CNN: http://edition.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html

Similar Documents

Free Essay

Russian Patriotic Hacking

...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...

Words: 8586 - Pages: 35

Free Essay

Cyber Attacks

...Cyber Attacks on the Government’s Transportation Grid Breaches and Security Implications by Penetration of the Western Interconnection’s  Traffic Control System and its Effects on Modern Day Life  Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the government’s transportation grid is compromised. The breach typically involves traffic control. As the stoplights and streetlights are in a state known as gridlock, external hackers usually make the situation as unruly as humanely plausible. However, the very nature of this unfortunate scenario can only be determined once the backgrounds of the systems that control it are thoroughly studied.  The contiguous United States is divided into three main alternating current power grids.  The Western Interconnected System, or Western Interconnection, is the one applicable to those  of us living in California. The electric utilities functioning in this region are tied together,  operating at 60Hz. While the grid is currently electrically powered, research by the National  Renewable Energy Laboratory (NREL) in Colorado indicates the Western Interconnection can  handle higher levels of renewable energy, in a quest to implement alternative energy sources. If  integrated correctly, the NREL have...

Words: 3038 - Pages: 13

Premium Essay

Waiting For Taleju Summary

...From there, he's trying to run against Maria for Russian President. However, the UK has frozen his funds so he calls Elizabeth to help him make a deal with Britain. While Maria has the Russian generals behind her, there are plenty of Russians that want peace and could be potential Gorev supporters. Bess comes up with a plan to lift the UK sanctions by allowing Gorev to sell his British properties. However, President Dalton and Craig Sterling are not that wild about the plan since the US has nothing to gain from it. So Sterling proposes that Gorev spills some Russian secrets to the US. Of course, Gorev is unwilling to do that. In the meantime, Henry orders Dmitri to talk to General Doroshevich at the Russian embassy. There, Dmitri overhears that Maria wants to bring Olga Gorev to the embassy to use her as leverage for the elections. He tells Henry, who subsequently resuces Olga just in time and brings her over to the McCord mansion. After Gorev tells Elizabeth some important information, he receives the money to run against Maria. However, before he can even leave London, Gorev is shot and killed. Olga later travels back...

Words: 1547 - Pages: 7

Premium Essay

Cyber Security

...being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means any action that may result in unauthorized access to, infiltration of, manipulation of, or impairment to the integrity, confidentiality, or availability of an information system or information that is stored on, processed by, or transiting an information system (Auerbach et al.). The sophistication and volume of cyber attacks has increased over the years and is expected to continue...

Words: 2041 - Pages: 9

Free Essay

Chemistry

...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19

Premium Essay

Hefty

...magine a criminal using your nanny cam to watch your house Can You Trust Your Fricge? TODAY'S INTERNET OF THINGS IS FULL OF SECURITY FLAWS. WE MUST DO BETTER By Alan Grau • Illustration by J D King or to scream at your child—or even to post footage of your home on a crime boss's website. And suppose your refrigerator were spewing spam e-mail, enraging people you'd never even met. The Internet of Things has been touted as many things. But what you haven't heard is that it could be your worst enemy. Yet all of these incidents have actually occurred, according to news reports. And it's likely that even more disturbing transgressions have been taking place unbeknownst to homeowners. For example, researchers have discovered that in some cases, they can hack the Internet of Things to intercept each document you print and divert it to a remote site, use your smart TV to bug your house, and even control the traffic light on the corner outside your home. For although the Internet of Things offers great convenience by linking our gadgets—an estimated 50 billion of them worldwide by 2020—it can also let hackers take control of your house, your car, and even your body. The vulnerabilities lie all around you. A recent HP Research study reported that the average Internet of Things gadget has an astounding 25 security flaws, and 70 percent have at least one such vulnerability. Many of these problems may yield to solutions like those adopted by the...

Words: 3850 - Pages: 16

Free Essay

Timbuk2 Success in the Bag

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 2869 - Pages: 12

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Free Essay

Tjmax

...see the ‘Courseware’ section of http://gallaugher.com 
 INTRODUCTION  
 LEARNING
OBJECTIVES:
 After
studying
this
section
you
should
be
able
to:

 1. Recognize
that
information
security
breaches
are
on
the
rise.
 2. Understand
the
potentially
damaging
impact
of
security
breaches.
 3. Recognize
that
information
security
must
be
made
a
top
organizational
priority.
 
 Sitting
in
the
parking
lot
of
a
Minneapolis
Marshalls,
a
hacker
armed
with
a
laptop
and
a
 telescope‐shaped
antenna
infiltrated
the
store’s
network
via
an
insecure
Wi‐Fi
base
station.

 The
attack
launched
what
would
become
a
billion‐dollar
plus
nightmare
scenario
for
TJX,
 the
parent
of
retail
chains
that
include
Marshalls,
Home
Goods,
and
T.J.
Maxx.
Over
a
period
 of
several
months,
the
hacker
and
his
gang
stole
at
least
45.7
million
credit
and
debit
card
 numbers,
and
pilfered
driver’s
license
and
other
private
information
from
an
additional
 450,000
customers2.
 
 TJX,
at
the
time
a
$17.5
billion,
Fortune
500
firm,
was
left
reeling
from
the
incident.

The
 attack
deeply
damaged
the
firm’s
reputation.

It
burdened
customers
and
banking
partners
 with
the
time
and
cost
of
reissuing
credit
cards.
And
TJX
suffered
under
settlement
costs,
 payouts
from
court‐imposed
restitution,
legal
fees,
and
more.
The
firm
estimated
that...

Words: 15885 - Pages: 64

Premium Essay

Computer

...Computer crime Computer Crime Definition A computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be discussed here. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is...

Words: 7299 - Pages: 30

Premium Essay

Information Security

...chapter 2 40 Chapter 2 you. I’ve asked Charlie Moody to come in today to talk about it. He’s waiting to speak with us.” When Charlie joined the meeting Fred said, “Hello, Charlie. As you know, the Board of Directors met today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start.” “Sounds expensive,” said Fred. Charlie looked at Gladys, then answered, “Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don’t have accurate estimates yet, but you can be sure we’ll put cost-benefit worksheets in front of you before we spend any money.” Fred thought about this for a few seconds. “OK. What’s our next step?” Gladys answered, “First, we need to initiate a project plan to develop our new information security program. We’ll use our usual systems development and project...

Words: 24411 - Pages: 98

Premium Essay

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...

Words: 21009 - Pages: 85

Premium Essay

“One” Short Film

...DARUL MUTAKIN 0825435 “ONE” SHORT FILM CHAPTER 1 INTRODUCTION 1.0 PREAMBLE The project is to produce the first motion graphic short film telling about the Muslims in the future. For information, most of the motion graphic film that is shown in the television, cinemas as well as the new media “Internet” is based on the Western way of life and perspective. The film is produced with the combination of real world videography and CGI (Computer-generated Imagery) technique that will enhance the storyline development. The story is about the revival of Muslims in the future whereby a group of Muslims will be united facing the cruelty of the Zionist. The concept of story that is trying to be highlighted almost similar idea with the film, “Valley of the Wolves : Palestine”, where the Muslims taking down the Zionist. But the different is that, it will take place in different environment, different looks and technology used. 1.1 PROBLEM DESCRIPTION 1.1.1 Background of the problem Based on our research and observation, there is a need in producing a film that can give a great impact on how we live our life and think. It is part of instrument or mechanism to attract people, whether it is a positive message or vice versa. People nowadays depends heavily to the Western sources when it come to this issue, whereas in our perspective, the message that was brought against the Islamic teachings. It somehow leads us to rebel and astray from the right path. Eventually, that...

Words: 5027 - Pages: 21

Premium Essay

Is3920 Lab 9

...Order Code RL33199 Data Security Breaches: Context and Incident Summaries Updated May 7, 2007 Rita Tehan Information Research Specialist Knowledge Services Group Data Security Breaches: Context and Incident Summaries Summary Personal data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver’s license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted. This report will be updated regularly. Contents Introduction . . . . . . . . . . . . . . . . . . . ....

Words: 18803 - Pages: 76

Free Essay

Vanity Fair in Cyberwar

...A Declaration of Cyber-War | Vanity Fair April 2011 Stuxnet Worm Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as Michael Joseph Gross reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating. By Michael Joseph GrossPhotograph by Jonas Fredwall Karlsson EMail GAME OF SHADOWS Eugene Kaspersky, co-founder and C.E.O. of Kaspersky Lab—a Moscow-based computer-security company and an early investigator of Stuxnet—photographed on the Bolshoy Moskvoretsky Bridge, near the Kremlin. All over Europe, smartphones rang in the middle of the night. Rolling over in bed, blinking open their eyes, civilians reached for the little devices and, in the moment of answering, were effectively drafted as soldiers. They shook themselves awake as they listened to hushed descriptions of a looming threat. Over the next few days and nights, in mid-July of last year, the ranks of these sudden draftees grew, as software analysts and experts in industrial-control systems gathered in makeshift war rooms in 3 of 14 6/21/2014 10:02 PM A Declaration of Cyber-War | Vanity Fair file:///C:/Users/malbun/Desktop/A...

Words: 7873 - Pages: 32