Cyber Warfare | TechSNAP 13

Cyber Warfare | TechSNAP 13

Since the start of this show, one constant theme keeps coming to light, a new age of Cyber warfare has begun.

In this week’s episode we cover what critical targets hackers and foreign governments might target to wage Cyber Warfare

Plus what major attacks have already taken place? Some of which we are just now learning the ramifications of…

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:


Show Notes:

Thanks to the TechSNAP Redditors!


No Q&A this week, but we’re doing a double dose next week, send in your feedback and questions!

Attacks on Government:

Topic: Anonymous hacks 100 Turkish Government Sites

  • As part of Operation Anti-Sec, Anonymous has compromised the Turkish governments network of sites, and locked the administrators out.
  • A number of the sites appear to be for Hospitals and other medical facilities
  • The group released a 20MB archive on ThePirateBay, a complete dump of the content of each of the compromised sites.
  • Many of the sites were defaced
  • In a Cyber Warfare type situation, these types of actions could disable critical government functions, everything from weather forecasts to tax filing.

Submitted by: Acidpunk

Topic: Florida Elections Database Hacked

  • The database contained the names, usernames and plaintext passwords of election workers and polling stations
  • Username was first initial, last name, and password was first initial, last initial and 4 numbers. These passwords are too predictable and horribly insecure.

Submitted by: Deathwalk

Topic: Attacks on RoK Gov might have been Drills by DPRK

  • Attacks that crippled South Korean (Republic of Korea) government websites in July 2009 and again in March 2011 might have been cyber warfare drills conducted by North Korea (Democratic People’s Republic of Korea)
  • Attacks were likely reconnaissance to start building a detailed plan of attack in the event of war.
  • Much of the attack came from within South Korea, it is speculated that the virus was left on a number of South Korean file sharing sites, and then the resulting botnet of infected computers was used to take down the government websites.

Attacks on Media:

Topic: Washington Post hacked, 1.27m email addresses leaked

  • The Washington Post’s Jobs site was compromised on June 27th and 28th
  • 1.27 Million Usernames and email addresses were leaked
  • The Washington Post claims that no passwords or other personal information were stolen (were the passwords just hashed, and therefore ‘not disclosed’, or did the attackers not gain access to the passwords?)

Topic: Fox News Twitter hacked, False Obama Death Notice

  • The @foxnewspolitics twitter account was hijacked and false news of US President Obama’s assassination was posted.
  • As with all incidents of this nature, it is being investigated by the Secret Service
  • BBC Coverage

Submitted by: beyere5398 and LeifAndersen

The Future:

Topic: The Pentagon Establishes Cyber Warfare Retaliation Policy

  • The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war
  • Foreign directed hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country’s military
  • If a cyber attack causes significant disruption (for example, to the power grid), or death, then the attackers will be met with conventional armed force.
  • New York Times coverage

Topic: More is happening than we actually know

  • By reverse engineering a crashed EP-3E Aries II reconnaissance plane, the Chinese were able to begin intercepting encrypted US Navy communications
  • A few weeks after President Obama’s election, the Chinese flooded communications links they knew were monitored by the NSA with unencrypted copies of intercepted communications, proving they had compromised American communications links.

Topic: Cyber Warfare will be constant and often subtle

  • The attacks on RSA earlier this year were not conclusively linked to Cyber Warfare, they could have been the work of a lone hacker, a small group, or an organized government
  • The RSA hack later led to the compromise of secure systems at Lockheed Martin and other US arms manufacturers.
  • Earlier this year we also saw the compromise of a large number of email accounts belonging to government and military officials. This type of reconnaissance can be used to gather information that would allow attackers to break in to more secured systems over time.
  • Many attacks go unnoticed, as the perpetrators keep the systems just to be used to launch future attacks from. As we saw in the RSA hack, the attackers used an offsite webserver they had compromised earlier to send the data to, to avoid connecting directly to RSA and possibly leaving a trail. They then destroyed the webserver, breaking the link back to them
  • In the past was have discussed the similar tactic of Island hopping, compromising an outward facing system such as a web, mail or monitoring server, or the desktop of a secretary or other lower level employee, and then slowly gathering more and more information in order to compromise the true targets of the attack.

Submitted by: Raventiger

South Korea army, University to start Cyber Defense majorSubmitted by: refuse2speak
Anonymous hacks apple server, leaks usernames and hashed passwords
The Fog of Cyber Warfare – A battle without borders?Submitted by: Raventiger
Chicago Mercantile Exchange Secrets and Source Code Leaked To China

Copies of vsftpd 2.3.4 downloaded from official mirrors contain backdoorSubmitted by: stmiller
Dropbox TOS gives them broad copyright license over your filesSubmitted by: rakudave
Targeted phishing helped hackers earn 150 million in JuneSubmitted by: stmiller

Bitcoin BLASTER:
Lawyer Attempts To Trademark Bitcoin
First bitcoin app for Android, but is it safe?
BTCGuild suffers major DDoS Attack

Download & Comment:

Question? Comments? Contact us here!