Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Network Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Energy Dept. Reportedly Latest Target of Hackers
Energy Dept. Reportedly Latest Target of Hackers

By Adam Dickter
February 4, 2013 3:49PM

Bookmark and Share
While no classified information is believed to have been compromised, the sophistication of the cyber attack at the U.S. Department of Energy reportedly suggests a "nation-state" involvement, and DOE has been a frequent target of Chinese hacks in the past. Last year saw a series of hacking attacks against U.S.-based companies and government agencies.
 


Looks like those Chinese hackers are at it again. After reports that intruders based there recently compromised the computers of The New York Times and The Wall Street Journal, targeting employee passwords and other data, the U.S. Department of Energy told employees in an e-mail that its systems, too, had been infiltrated.

The story was first reported by the nonprofit online newspaper Washington Free Beacon, which said FBI and Energy Department investigators were probing the theft of employee information at the agency and whether the hack was a prelude to an attempt to carry out a much more pervasive attack to gain classified data in the future.

Virtual Battlefield

While no classified information is believed to have been compromised, the sophistication of the attack suggests a "nation-state" involvement, the paper said, and Energy has been a frequent target of Chinese hacks in the past.

Last year saw a series of hacking attacks against U.S.-based companies and government agencies, including a military computer at the White House. The virtual battlefield is an increasingly busy theater of operations as the U.S. struggles to ward off an onslaught of foreign hackers.

In 2009, then-Defense Secretary Robert M. Gates established the U.S. Cyber Command, a division of the U.S. Strategic Command, headed by Gen. Keith B. Alexander, to defend military systems. Its job is to "direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries."

The Department of Homeland Security, however, is charged with defending non-military government (the .gov domain) computers such as those at DOE, while Cyber Command defends the .mil domain.

Global cyber security expert Chester Wisniewski of the firm Sophos told us there was too little information to determine "concrete conclusions" about what the Chinese were up to.

"It is fair to say that the Chinese are not having any difficulty staying busy and it is far more likely that we are just hearing it from more organizations than usual," Wisniewski said.

Encrypt Your Data

"Most organizations are compromised multiple times per year and just prefer to keep it quiet. Of course the extent to which the attackers were able to exploit them often determines whether they are obligated to let the cat out of the bag."

He added that one missing question regards why personal information seems to have been stored unencrypted.

"It is impossible to maintain a perfectly secure environment, so you ought to know that the "bad guys" are going to end up on your network from time to time," he said. "Why did you leave sensitive information just lying around for the taking? We shouldn't blame the victims, but negligence is negligence."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Fund Seeks To Head Off Heartbleeds
2.   Lessons from Verizon's Threat Report
3.   Verizon Report Exposes Cyberthreats
4.   How Are Web Sites Post-Heartbleed?
5.   White House Updating Privacy Policy


advertisement
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.